X-Git-Url: https://git.heureux-cyclage.org/?a=blobdiff_plain;f=HISTORY;h=e4098133c88e7cb5ec037b75da0bbb3fbb26301d;hb=255a58bedd29491c5550eebe4b8d0a5968f0d56c;hp=288791f8093c7780c54c2037eeb3fbdb9521d5b7;hpb=94301c46636dc8944a6f06bf7053cefcc6ff484c;p=lhc%2Fweb%2Fwiklou.git diff --git a/HISTORY b/HISTORY index 288791f809..e4098133c8 100644 --- a/HISTORY +++ b/HISTORY @@ -2,6 +2,25 @@ Change notes from older releases. For current info see RELEASE-NOTES-1.33. = MediaWiki 1.32 = +== MediaWiki 1.32.1 == + +=== Changes since MediaWiki 1.32.0 === +* (T213577) rdbms: avoid transaction status errors from ping() in rollback(). +* rdbms: Pass required parameter. +* rdbms: do not treat SAVEPOINT and RELEASE SAVEPOINT as write queries. +* (T204531) rdbms: reduce LoadBalancer replication log spam. +* (T213489) Avoid session double-start in Setup.php. +* (T213717) Correct namespace 'Template' for gom-deva +* (T198054) Fix login page crash caused by unknown language via ?uselang +* (T215324) (T210937) list=users mistakenly reports user as missing. +* (T209483) Add ILBFactory::redefineLocalDomain method. This is intended for +use with scripts like addWiki.php to avoid mismatched domain errors. +* (T208871) The hard-coded Google search form on the database error page was +removed. +* (T204800) Fix Title::getFragmentForURL for bad interwiki prefix +* (T215566) Fix installer being unable to determine if the database exists +during a fresh installation. + == MediaWiki 1.32.0 == === Changes since MediaWiki 1.32.0-rc.2 === @@ -4785,6 +4804,11 @@ of files that are no longer available follows. = MediaWiki 1.23 = +== MediaWiki 1.23.17 == + +=== Changes since 1.23.16 === +* Fix syntax errors introduced in 1.23.16 when running PHP 5.3. + == MediaWiki 1.23.16 == This is a security and maintenance release of the MediaWiki 1.23 branch. @@ -7044,6 +7068,52 @@ changes to languages because of Bugzilla reports. == MediaWiki 1.19 == +== MediaWiki 1.19.24 == + +This is a security and maintenance release of the MediaWiki 1.19 branch. + +=== Changes since 1.19.23 === + +* ({{bug|T85848}}, {{bug|T71210}}) SECURITY: Don't parse XMP blocks that +contain XML entities, to prevent various DoS attacks. +* ({{bug|T88310}}) SECURITY: Always expand xml entities when checking SVG's. +* ({{bug|T73394}}) SECURITY: Escape > in Html::expandAttributes to prevent XSS. +* ({{bug|T85855}}) SECURITY: Don't execute another user's CSS or JS on preview. +* ({{bug|T85349}}, {{bug|T85850}}, {{bug|T86711}}) SECURITY: Multiple issues +fixed in SVG filtering to prevent XSS and protect viewer's privacy. + +== MediaWiki 1.19.23 == + +This is a security and maintenance release of the MediaWiki 1.19 branch. + +=== Changes since 1.19.22 === + +* (bug T76686) [SECURITY] thumb.php outputs wikitext message as raw HTML, which +could lead to xss. Permission to edit MediaWiki namespace is required to +exploit this. +* (bug T74222) The original patch for T74222 was reverted as unnecessary. +* Add missing $ in front of variable in OutputPage.php + +== MediaWiki 1.19.22 == + +This is a security and maintenance release of the MediaWiki 1.19 branch. + +=== Changes since 1.19.21 === + +* ({{bug|66776}}, {{bug|71478}}) SECURITY: User PleaseStand reported a way to +inject code into API clients that used format=php to process pages that +underwent flash policy mangling. This was fixed along with improving how the +mangling was done for format=json, and allowing sites to disable the mangling +using $wgMangleFlashPolicy. +* ({{bug|72222}}) SECURITY: Do not show log action when the entry is revdeleted +with DELETED_ACTION. NOTICE: this may be reverted in a future release pending a +public RFC about the desired functionality. This issue was reported by user +Bawolff. +* ({{bug|71621}}) Make allowing site-wide styles on restricted special pages a +config option. +* $wgMangleFlashPolicy was added to make MediaWiki's mangling of anything that +might be a flash policy directive configurable. + == MediaWiki 1.19.21 == This is a maintenance release of the MediaWiki 1.19 branch. @@ -11355,6 +11425,43 @@ regularly. Below only new and removed languages are listed. == MediaWiki 1.13 == +== MediaWiki 1.13.5 == + +February 22, 2009 + +This is a maintenance update to the Summer 2008 snapshot release of MediaWiki. + +MediaWiki is now using a "continuous integration" development model with +quarterly snapshot releases. The latest development code is always kept +"ready to run", and in fact runs our own sites on Wikipedia. + +Release branches will continue to receive security updates for about a year +from first release, but nonessential bugfixes and feature developments +will be made on the development trunk and appear in the next quarterly release. + +Those wishing to use the latest code instead of a branch release can obtain +it from source control: http://www.mediawiki.org/wiki/Download_from_SVN + +== Changes since 1.13.4 == + +* (bug 17449) Fixed PostgreSQL installation +* (bug 17527) Fixed missing MySQL-specific options in installer + +== Changes since 1.13.3 == + +A number of cross-site scripting (XSS) security vulnerabilities were discovered +in the web-based installer (config/index.php). These vulnerabilities all +require a live installer -- once the installer has been used to install a wiki, +it is deactivated. + +Note that cross-site scripting vulnerabilities can be used to attack any website +in the same cookie domain. So if you have an uninstalled copy of MediaWiki on +the same site as an active web service, MediaWiki could be used to attack the +active service. + +If you are hosting an old copy of MediaWiki that you have never installed, you +are advised to remove it from the web. + == Changes since 1.13.2 == David Remahl of Apple's Product Security team has identified a number of @@ -11997,9 +12104,143 @@ Other changes in this release: the page * list=exturlusage in "list all links" mode can now filter by protocol +== MediaWiki 1.12 == +== MediaWiki 1.12.4 == -== MediaWiki 1.12 == +February 7, 2009 + +A number of cross-site scripting (XSS) security vulnerabilities were discovered +in the web-based installer (config/index.php). These vulnerabilities all +require a live installer -- once the installer has been used to install a wiki, +it is deactivated. + +Note that cross-site scripting vulnerabilities can be used to attack any +website in the same cookie domain. So if you have an uninstalled copy of +MediaWiki on the same site as an active web service, MediaWiki could be used to +attack the active service. + +If you are hosting an old copy of MediaWiki that you have never installed, you +are advised to remove it from the web. + +== MediaWiki 1.12.3 == + +* Fixed packaging/distribution error. Many files were missing from the +distributed tarball. + +== MediaWiki 1.12.2 == + +David Remahl of Apple's Product Security team has identified a number of +security issues in previous releases of MediaWiki. Subsequent analysis by the +MediaWiki development team expanded the scope of these vulnerabilities. The +issues with a significant impact are as follows: + +* A local script injection vulnerability affecting Internet Explorer clients +for all MediaWiki installations with uploads enabled. [CVE-2008-5250] +* A local script injection vulnerability affecting clients with SVG scripting +capability (such as Firefox 1.5+), for all MediaWiki installations with SVG +uploads enabled. [CVE-2008-5250] +* A CSRF vulnerability affecting the Special:Import feature, for all MediaWiki +installations since the feature was introduced in 1.3.0. [CVE-2008-5252] + +A local script injection vulnerability allows an attacker with a wiki account +to steal another user's login session, and to act as that user on the wiki. The +attacker uploads a malicious script file, and tricks the victim into executing +it. + +CSRF vulnerabilities allow an attacker to act as an authorised user on the +wiki, but unlike an XSS vulnerability, the attacker can only act as the user in +a specific and restricted way. The present CSRF vulnerability allows pages to +be edited, with forged revision histories. Like an XSS vulnerability, the +authorised user must visit the malicious web page to activate the attack. + +These three vulnerabilities are all fixed in this release. + +David Remahl also reminded us of some security-related configuration issues: + +* By default, MediaWiki stores a backup of deleted images in the images/deleted +directory. If you do not want these images to be publically accessible, make +sure this directory is not accessible from the web. MediaWiki takes some steps +to avoid leaking these images, but these measures are not perfect. +* Set display_errors=off in your php.ini to avoid path disclosure via PHP fatal +errors. This is the default on most shared web hosts. +* Enabling MediaWiki's debugging features, such as $wgShowExceptionDetails, may +lead to path disclosure. + +Other changes in this release: + +* Avoid fatal error in profileinfo.php when not configured. +* Add a .htaccess to deleted images directory for additional protection against +exposure of deleted files with known SHA-1 hashes on default installations. +* Avoid streaming uploaded files to the user via index.php. This allows +security-conscious users to serve uploaded files via a different domain, and +thus client-side scripts executed from that domain cannot access the login +cookies. Affects Special:Undelete, img_auth.php and thumb.php. +* When streaming files via index.php, use the MIME type detected from the file +extension, not from the data. This reduces the XSS attack surface. +* Blacklist redirects via Special:Filepath. Such redirects exacerbate any XSS +vulnerabilities involving uploads of files containing scripts. +* Internationalisation updates. + +== MediaWiki 1.12.1 == + +Changes since 1.12.0: +* (bug [[bugzilla:13522|13522]]) Fix fatal error in Parser::extractTagsAndParams +* (bug [[bugzilla:12077|12077]]) Fix HTML nesting for TOC +* (bug [[bugzilla:13532|13532]]) Use proper timestamp call when reverting images +* (bug [[bugzilla:13649|13649]], [[bugzilla:14084|14084]]) Bad call to +wfTimestamp() +* (bug [[bugzilla:13770|13770]]) Use Preprocessor_Hash by default to avoid +missing DOM module errors +* (bug [[bugzilla:13442|13442]]) API: Missing pages in prop=langlinks and +prop=extlinks are now handled properly. +* (bug [[bugzilla:13482|13482]]) API: Disabled search types handled properly +* (bug [[bugzilla:13836|13836]]) API: Fixed fatal errors resulting from +combining iiprop=metadata with format=xml +* (bug [[bugzilla:11633|11633]]) API: Explicitly convert redirect titles to +strings due to PHP's very weak typing on array keys. +* API: Fixing main page display in meta=siteinfo +* (bug [[bugzilla:11719|11719]]) API: Remove trailing blanks in YAML output. +* (bug [[bugzilla:13718|13718]]) API: Return the proper continue parameter for +cmsort=timestamp +* Security: Work around misconfiguration by requiring strict comparisons for +in_array in User::isAllowed(). +* Security: Fixed XSS vulnerability in useskin parameter. + +== MediaWiki 1.12.0 == + +This is the quarterly branch release of [[MediaWiki]] for Winter 2008. + +MediaWiki is now using a "continuous integration" development model with +quarterly snapshot releases. The latest development code is always kept "ready +to run", and in fact runs our own sites on [[wikipedia:|Wikipedia]]. + +Release branches will continue to receive security updates for about a year +from first release, but nonessential bugfixes and feature developments will be +made on the development trunk and appear in the next quarterly release. + +Those wishing to use the latest code instead of a branch release can obtain it +from source control: [[Download from SVN]]. + +Changes since 1.12.0rc1: +*(bug [[bugzilla:13359|13359]]) Double-escaping in [[Special:Allpages]]. +*Localization updates. + +== MediaWiki 1.12.0rc1 == + +This is a release candidate of the Winter 2008 quarterly snapshot release of +[[MediaWiki]]. + +MediaWiki is now using a "continuous integration" development model with +quarterly snapshot releases. The latest development code is always kept "ready +to run", and in fact runs our own sites on [[wikipedia:|Wikipedia]]. + +Release branches will continue to receive security updates for about a year +from first release, but nonessential bugfixes and feature developments will be +made on the development trunk and appear in the next quarterly release. + +Those wishing to use the latest code instead of a branch release can obtain it +from source control: [[Download from SVN]]. This is the Winter 2007 quarterly release. @@ -12553,6 +12794,76 @@ Full API documentation is available at https://www.mediawiki.org/wiki/API == MediaWiki 1.11 == +== MediaWiki 1.11.2 == + +March 2, 2008 + +This is a security release of the Fall 2007 snapshot release of MediaWiki. +Possible cross-site information leaks using the callback parameter for +JSON-formatted results in the API are prevented by dropping user credentials. + +MediaWiki release versions prior to 1.11 are not vulnerable, as they do not +include the callback feature which allows client-side JavaScript on other sites +to reach API data. + +Changes in this release: + +* User credentials are dropped for API JSON requests using a callback +* Edit tokens are not reported for API JSON requests using a callback + +== MediaWiki 1.11.1 == + +January 23, 2008 + +This is a security and bugfix release of the Fall 2007 snapshot release of + MediaWiki. A potential XSS injection vector affecting api.php only for + Microsoft Internet Explorer users has been closed. + +Changes in this release: +* (bug [[bugzilla:11450|11450]]) Fix creation of objectcache table on upgrade +* (bug [[bugzilla:11462|11462]]) Fix typo in LanguageGetSpecialPageAliases hook +name +* Fix regression in LinkBatch.php breaking PHP 5.0 +* Security fix for API on MSIE + +To work around the vulnerability without upgrading, you may disable the API if +you don't need it: +:[[Manual:$wgEnableAPI|$wgEnableAPI]] = false; + +Not vulnerable versions: +* 1.12 or later +* 1.11 >= 1.11.1 +* 1.10 >= 1.10.3 +* 1.9 >= 1.9.5 +* 1.8 any version (if $wgEnableAPI has been left off) + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.2 +* 1.9 <= 1.9.4 +* 1.8 any version (if $wgEnableAPI has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the API +functionality, however the BotQuery extension is similarly vulnerable unless +updated to the latest SVN version. + +== MediaWiki 1.11.0 == + +September 10, 2007 + +This is the Fall 2007 snapshot release of MediaWiki. + +MediaWiki is now using a "continuous integration" development model with +quarterly snapshot releases. The latest development code is always kept "ready +to run", and in fact runs our own sites on Wikipedia. + +Release branches will continue to receive security updates for about a year +from first release, but nonessential bugfixes and feature developments will be +made on the development trunk and appear in the next quarterly release. + +Those wishing to use the latest code instead of a branch release can obtain it +from source control: [[Download from SVN]] + This is the Summer 2007 branch release of MediaWiki. MediaWiki is now using a "continuous integration" development model with @@ -12566,6 +12877,33 @@ will be made on the development trunk and appear in the next quarterly release. Those wishing to use the latest code instead of a branch release can obtain it from source control: https://www.mediawiki.org/wiki/Download_from_SVN +== Changes since 1.11.0rc1 == + +A possible HTML/XSS injection vector in the API pretty-printing mode has been +found and fixed. + +The vulnerability may be worked around in an unfixed version by simply +disabling the API interface if it is not in use, by adding this to +[[Manual:LocalSettings.php|LocalSettings.php]]:
+[[Manual:$wgEnableAPI|$wgEnableAPI]] = false;
+(This is the default setting in 1.8.x.) + +Not vulnerable versions: +* 1.11 >= 1.11.0 +* 1.10 >= 1.10.2 +* 1.9 >= 1.9.4 +* 1.8 >= 1.8.5 + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.1 +* 1.9 <= 1.9.3 +* 1.8 <= 1.8.4 (if [[Manual:$wgEnableAPI|$wgEnableAPI]] has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the faulty +function, however the [[Extension:BotQuery|BotQuery extension]] is similarly +vulnerable unless updated to the latest SVN version. + == Configuration changes since 1.10 == * $wgThumbUpright - Adjust width of upright images when parameter 'upright' is @@ -12574,7 +12912,8 @@ it from source control: https://www.mediawiki.org/wiki/Download_from_SVN usergroups * $wgEnotifImpersonal, $wgEnotifUseJobQ - Bulk mail options for large sites * $wgShowHostnames - Expose server host names through the API and HTML comments -* $wgSaveDeletedFiles has been removed, the feature is now enabled unconditionally +* $wgSaveDeletedFiles has been removed, the feature is now enabled +unconditionally == New features since 1.10 == @@ -13141,6 +13480,121 @@ Full API documentation is available at https://www.mediawiki.org/wiki/API == MediaWiki 1.10 == +== MediaWiki 1.10.4 == + +March 2, 2008 + +* Correction for API path fix, broken in 1.10.3 + +== MediaWiki 1.10.3 == + +January 23, 2008 + +This is a security update to the Winter 2007 quarterly release. A potential +XSS injection vector affecting api.php only for Microsoft Internet Explorer +users has been closed. + + +To work around the vulnerability without upgrading, you may disable the API if +you don't need it: + +:[[Manual:$wgEnableAPI|$wgEnableAPI]] = false; + +Not vulnerable versions: +* 1.12 or later +* 1.11 >= 1.11.1 +* 1.10 >= 1.10.3 +* 1.9 >= 1.9.5 +* 1.8 any version (if $wgEnableAPI has been left off) + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.2 +* 1.9 <= 1.9.4 +* 1.8 any version (if $wgEnableAPI has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the API +functionality, however the BotQuery extension is similarly vulnerable unless +updated to the latest SVN version. + +== MediaWiki 1.10.2 == +September 10, 2007 + +This is a security fix update to the Spring 2007 quarterly release snapshot. A +possible HTML/XSS injection vector in the API pretty-printing mode has been +found and fixed. + +The vulnerability may be worked around in an unfixed version by simply +disabling the API interface if it is not in use, by adding this to +LocalSettings.php: +:[[Manual:$wgEnableAPI|$wgEnableAPI]] = false; + +Not vulnerable versions: +* 1.11 >= 1.11.0 +* 1.10 >= 1.10.2 +* 1.9 >= 1.9.4 +* 1.8 >= 1.8.5 + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.1 +* 1.9 <= 1.9.3 +* 1.8 <= 1.8.4 (if $wgEnableAPI has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the faulty +function, however the BotQuery extension is similarly vulnerable unless updated +to the latest SVN version. + +== MediaWiki 1.10.1 == +July 13, 2007 + +This is a bugfix update to the Spring 2007 quarterly release snapshot. A number +of fixes to improve compatibility with PostgreSQL, some versions of MySQL, and +some PHP configurations are included. + +Changes since 1.10.0: + +* (bug [[bugzilla:9417|9417]]) Uploading new versions of images when using +Postgres no longer throws warnings. +* (bug [[bugzilla:9908|9908]]) Using tsearch2 with Postgres 8.1 no longer gives +an error. +* (bug [[bugzilla:9973|9973]]) Changed size was shown in advanced recentchanges +collapsible items with $wgRCShowChangedSized = false. +* Fixed installation on MyISAM or old InnoDB with charset=utf8, was giving +overlong key errors. +* Fixed zero-padding issues with MySQL 5 binary schema +* (bug [[bugzilla:9820|9820]]) session.save_path check no longer halts +installation, but warns of possible bad values +* (bug [[bugzilla:9978|9978]]) Fixed session.save_path validation when using +extended configuration format, e.g. "5;/tmp" + +== MediaWiki 1.10.0 == +May 9, 2007 + +This is the quarterly release snapshot for Spring 2007. See below for a full +list of changes since the 1.9.x series. + +Changes since 1.10.0rc2: + +* (bug [[bugzilla:9808|9808]]) Fix regression that ignored user 'rclimit' +option for Special:Contributions + +== MediaWiki 1.10.0rc2 == +May 4, 2007 + +THIS IS A RELEASE CANDIDATE MADE AVAILABLE FOR TESTING! +A FINAL 1.10.0 RELEASE WILL APPEAR WITHIN A FEW DAYS. + +Changes since 1.10.0rc1: +* Various l10n fixes and updates +* Fix for upgrade of page_restrictions table +* (bug [[bugzilla:9780|9780]]) Fix normalization of titles with initial colon +followed by whitespace +* Fix for regression in upload: wrong size info saved into image table +* Avoid cyclic stub problems when authorization hooks do funny things with the +user and the database at load time + +== MediaWiki 1.10.0rc1 == This is the Spring 2007 branch release of MediaWiki. MediaWiki is now using a "continuous integration" development model with @@ -13630,10 +14084,159 @@ break. Don't forget to always back up your database before upgrading! See the file UPGRADE for more detailed upgrade instructions. = MediaWiki release notes = - Security reminder: MediaWiki does not require PHP's register_globals setting since version 1.2.0. If you have it on, turn it *off* if you can. += MediaWiki 1.9 = + +== MediaWiki 1.9.6 == + +March 2, 2008 + +* Correction for API path fix, broken in 1.9.5 + +== MediaWiki 1.9.5 == + +January 23, 2008 + +This is a security update to the Winter 2007 quarterly release. A potential XSS +injection vector affecting api.php only for Microsoft Internet Explorer users +has been closed. + + +To work around the vulnerability without upgrading, you may disable the API if +you don't need it: + +:[[Manual:$wgEnableAPI|$wgEnableAPI]] = false; + +Not vulnerable versions: +* 1.12 or later +* 1.11 >= 1.11.1 +* 1.10 >= 1.10.3 +* 1.9 >= 1.9.5 +* 1.8 any version (if $wgEnableAPI has been left off) + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.2 +* 1.9 <= 1.9.4 +* 1.8 any version (if $wgEnableAPI has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the API +functionality, however the BotQuery extension is similarly vulnerable unless +updated to the latest SVN version. + +== MediaWiki 1.9.4 == + +September 10, 2007 + +This is a security and bug fix update to the Winter 2007 quarterly release. +Minor compatibility fixes for IIS 5 are included. + +* (bug [[bugzilla:8847|8847]]) Strip spurious #fragments from request URI to +fix redirect loops on some server configurations +* A possible HTML/XSS injection vector in the API pretty-printing mode has been +found and fixed. + +The vulnerability may be worked around in an unfixed version by simply +disabling the API interface if it is not in use, by adding this to +LocalSettings.php: + +:[[Manual:$wgEnableAPI|$wgEnableAPI]] = false; + +Not vulnerable versions: +* 1.11 >= 1.11.0 +* 1.10 >= 1.10.2 +* 1.9 >= 1.9.4 +* 1.8 >= 1.8.5 + +Vulnerable versions: +* 1.11 <= 1.11.0rc1 +* 1.10 <= 1.10.1 +* 1.9 <= 1.9.3 +* 1.8 <= 1.8.4 (if $wgEnableAPI has been switched on) + +MediaWiki 1.7 and below are not affected as they do not include the faulty +function, however the BotQuery extension is similarly vulnerable unless updated +to the latest SVN version. + +== MediaWiki 1.9.3 == + +February 20, 2007 + +This is a security and bug-fix update to the Winter 2007 quarterly release. +Minor compatibility fixes for IIS and PostgreSQL are included. + +An XSS injection vulnerability based on Microsoft Internet Explorer's UTF-7 +charset autodetection was located in the AJAX support module, affecting MSIE +users on MediaWiki 1.6.x and up when the optional setting $wgUseAjax is enabled. + +If you are using an extension based on the optional Ajax module, either disable +it or upgrade to a version containing the fix: + +* 1.9: fixed in 1.9.3 +* 1.8: fixed in 1.8.4 +* 1.7: fixed in 1.7.3 +* 1.6: fixed in 1.6.10 + +There is no known danger in the default configuration, with ''$wgUseAjax'' off. + +* ([[mediazilla:8992|8992]]) Fix a remaining raw use of REQUEST_URI in history +* ([[mediazilla:8984|8984]]) Fix a database error in +Special:Recentchangeslinked when using the PostgreSQL database. +* Add ''charset'' to Content-Type headers on various HTTP error responses to +forestall additional UTF-7-autodetect XSS issues. PHP sends only ''text/html'' +by default when the script didn't specify more details, which some +inconsiderate browsers consider a license to autodetect the deadly, +hard-to-escape UTF-7. This fixes an issue with the Ajax interface error message +on MSIE when ''$wgUseAjax'' is enabled (not default configuration); this UTF-7 +variant on a previously fixed attack vector was discovered by Moshe BA from +BugSec: [http://www.bugsec.com/articles.php?Security=24 +http://www.bugsec.com/articles.php?Security=24] +* Trackback responses now specify XML content type + +== MediaWiki 1.9.2 == + +February 4, 2007 + +This is a bug-fix update that fixes some installation and other minor issues +with the 1.9.1 release as well as a security issue which was introduced in the +1.9 branch. + +JavaScript code which regenerated the "sortable tables" feature did not +properly sanitize input, leading to an HTML injection vulnerability. + +* ([[mediazilla:8774|8774]]) Fix path for GNU FDL rights icon on new installs +* ([[mediazilla:8819|8819]]) Fix full path disclosure with skins dependencies +* ([[mediazilla:8819|8819]]) Fixed data-loss bug in compressOld batch text +compression affecting pages which had null edits (move, protect, etc) as second +edit in a batch group. Isolated and patched by Travis Derouin. +* Security fix for sortable tables JavaScript + +== MediaWiki 1.9.1 == + +January 24, 2007 + +This is a bug-fix update that fixes some installation and upgrade issues with +the original 1.9.0 release. + +* ([[mediazilla:3000|3000]]) Fall back to SCRIPT_NAME plus QUERY_STRING when +REQUEST_URI is not available, as on IIS with PHP-CGI +* Security fix for DjVu images. (Only affects servers where .djvu file uploads +are enabled and ''$wgDjvuToXML'' is set.) +* ([[mediazilla:8638|8638]]) Fix update from 1.4 and earlier +* ([[mediazilla:8641|8641]]) Fix order of updates to ipblocks table for updates +from <=1.7 +* ([[mediazilla:8673|8673]]) Minor fix for web service API content-type header +* Fix API revision list on PHP 5.2.1; bad reference assignment +* Fixed up the AjaxSearch +* Exclude settings files when generating documentation. That could expose the +database user and password to remote users. +* ar: fix the 'create a new page' on search page when no exact match found +* Correct tooltip accesskey hint for Opera on the Macintosh (uses Shift-Esc-, +not Ctrl-). +* ([[mediazilla:8719|8719]]) Firefox release notes lie! Fix tooltips for +Firefox 2 on x11; accesskeys default settings appear to be same as Windows. == Changes since 1.8 == @@ -14574,6 +15177,108 @@ they will be run along with the main tests by maintenance/parserTests.php * (bug 7537) Add php5 to $wgFileBlacklist * (bug 6929) Restore AutoAuthenticate hook += MediaWiki 1.7= + +== MediaWiki 1.7.3 == + +February 20, 2007 + +This is a security and bug-fix update to the Summer 2006 quarterly release. + +An XSS injection vulnerability based on Microsoft Internet Explorer's UTF-7 +charset autodetection was located in the AJAX support module, affecting MSIE +users on MediaWiki 1.6.x and up when the optional setting +[[Manual:$wgUseAjax|$wgUseAjax]] is enabled. + +If you are using an extension based on the optional Ajax module, either disable +it or upgrade to a version containing the fix: + +* 1.9: fixed in 1.9.3 +* 1.8: fixed in 1.8.4 +* 1.7: fixed in 1.7.3 +* 1.6: fixed in 1.6.10 + +There is no known danger in the default configuration, with +[[Manual:$wgUseAjax|$wgUseAjax]] off. + +* Add 'charset' to Content-Type headers on various HTTP error responses to +forestall additional UTF-7-autodetect XSS issues. PHP sends only 'text/html' by +default when the script didn't specify more details, which some inconsiderate +browsers consider a license to autodetect the deadly, hard-to-escape UTF-7. +This fixes an issue with the Ajax interface error message on MSIE when +[[Manual:$wgUseAjax|$wgUseAjax]] is enabled (not default configuration); this +UTF-7 variant on a previously fixed attack vector was discovered by Moshe BA +from BugSec: http://www.bugsec.com/articles.php?Security=24 +* Trackback responses now specify XML content type + +== MediaWiki 1.7.2 == + +January 9, 2007 + +* Note about $wgUploadSizeWarning using byte +* Update to German bookstore list (de) +* (bug [[bugzilla:6680|6680]]) Added localisation for Dutch bookstore list (nl) +* (bug [[bugzilla:6708|6708]]) Minor updates to Russian translation (ru) +* (bug [[bugzilla:6730|6730]]) Clearer usage of message 'titlematch' in German +translation (de) +* Added direction mark to Special:Listredirects +* XSS fix in AJAX module + +An XSS injection vulnerability was located in the AJAX support module, +affecting MediaWiki 1.6.x and up when the optional setting +[[Manual:$wgUseAjax|$wgUseAjax]] is enabled. + +There is no danger in the default configuration, with +[[Manual:$wgUseAjax|$wgUseAjax]] off. + +If you are using an extension based on the optional AJAX module, either disable +it or upgrade to a version containing the fix: + +* 1.9: fixed in 1.9.0rc2 +* 1.8: fixed in 1.8.3 +* 1.7: fixed in 1.7.2 +* 1.6: fixed in 1.6.9 + + +== MediaWiki 1.7.1 == + +July 8, 2006 + +MediaWiki 1.7.1 is a security and bugfix maintenance release of the Summer 2006 +snapshot: + +A potential HTML/JavaScript-injection vulnerability in a debugging script has +been fixed. Only versions and configurations of PHP vulnerable to the $GLOBALS +overwrite vulnerability are affected. + +As a workaround for existing installs, profileinfo.php may simply be deleted if +it's not being used. + +* Fix for 'emailconfirmed' implicit user group +* Fix for upgrades on some versions of MySQL 4.0.x +* Fixed potential XSS in profileinfo.php +* Installer now shows clear error message about old PHP versions rather than a +confusing parse error + +== MediaWiki 1.7.0 == +July 6, 2006 + +This is the quarterly release snapshot for Summer 2006. While the code +has been running on Wikipedia for some time, installation and upgrade +bits may be less well tested. Bug fix releases may follow in the coming +days or weeks. + +MediaWiki is now using a "[[w:en:Continuous_integration|continuous +integration]]" development model with +quarterly snapshot releases. The latest development code is always kept +"ready to run", and in fact runs our own sites on Wikipedia. + +Release branches will continue to receive security updates for about a year +from first release, but nonessential bugfixes and feature development happen +will be made on the development trunk and appear in the next quarterly release. + +Those wishing to use the latest code instead of a branch release can obtain +it from source control: [[Download from SVN]] == Changes since 1.6 == @@ -15198,6 +15903,55 @@ they will be run along with the main tests by maintenance/parserTests.php * (bug 6577) Avoid multiline parser breakage on
 with newline in attribute
 * (bug 6771) Make old revisions of MediaWiki pages available with action=raw
 
+
+== Compatibility ==
+MediaWiki 1.7 requires PHP 5 (5.1 recommended). PHP 4 is no longer supported.
+
+If you are unable to run PHP 5, you may have to stick with 1.6 for now.
+
+MySQL 3.23.x is no longer supported; some older hosts may need to upgrade.
+At this time we still recommend 4.0, but 4.1/5.0 will work fine in most cases.
+
+Experimental Oracle support has been dropped as it is unmaintained.
+
+== Upgrading ==
+Several changes to the database have been made from 1.6:
+
+* A new "langlinks" table tracks interlanguage links
+* A new "filearchive" table stores information on deleted files
+* A new "querycache_info" table stores information on query page updates
+
+To ensure that these tables are filled with data, run refreshLinks.php after
+the upgrade.
+
+If you are upgrading from MediaWiki 1.4.x or earlier, some major database
+changes are made, and there is a slightly higher chance that things could
+break. Don't forget to always back up your database before upgrading!
+
+== Configuration changes ==
+
+Some configuration options have changed:
+* $wgAllowExternalImages now defaults to off for increased security.
+* $wgLocalTZoffset was in hours, it is now using minutes.
+* Extensions may register special pages via the $wgSpecialPages array without
+forcing an early load of the SpecialPage.php class file.
+
+== Major new features ==
+
+* Deleted files can now be archived and undeleted, if you set up an appropriate
+non-web-accessible directory. Set $wgSaveDeletedFiles on and an appropriate
+directory path in $wgFileStore['deleted']['directory']
+* Experimental PostgreSQL support has been updated. It may or may not be in
+usable shape; those interested in PostgreSQL are encouraged to follow 1.8
+development.
+
+=== Caveats ===
+Some output, particularly involving user-supplied inline HTML, may not
+produce 100% valid or well-formed XHTML output. Testers are welcome to
+set $wgMimeType = "application/xhtml+xml"; to test for remaining problem
+cases, but this is not recommended on live sites. (This must be set for
+MathML to display properly in Mozilla.)
+
 == Changes since 1.5 ==
 
 * (bug 2885) More PHP 5.1 fixes: skin, search, log, undelete