X-Git-Url: http://git.vanrenterghem.biz/git.ikiwiki.info.git/blobdiff_plain/541ae5261744a3c4b047e333a15120321d5b7889..1226d9f144310876080c077a9c45bd2257829a32:/doc/security.mdwn diff --git a/doc/security.mdwn b/doc/security.mdwn index f0fcb0cd7..c3b62cd3c 100644 --- a/doc/security.mdwn +++ b/doc/security.mdwn @@ -480,10 +480,20 @@ untrusted committers, or have the attachments plugin enabled. Ludwig Nussel discovered a way for users to hijack root's tty when ikiwiki-mass-rebuild was run. Additionally, there was some potential -for information disclosure via symlinks. +for information disclosure via symlinks. ([[!cve CVE-2011-1408]]) -This hole was disconvered on 8 June 2011 and fixed the same day with +This hole was discovered on 8 June 2011 and fixed the same day with the release of ikiwiki 3.20110608. Note that the fix is dependant on -a su that has a similar hole fixed; [[!debbug 628843]] tracks fixing -the hole in Debian's su. An upgrade is a must for any sites whose -admins run ikiwiki-mass-rebuild. +a version of su that has a similar hole fixed. Version 4.1.5 of the shadow +package contains the fixed su; [[!debbug 628843]] tracks fixing the hole in +Debian. An upgrade is a must for any sites that have `ikiwiki-update-wikilist` +installed suid (not the default), and whose admins run `ikiwiki-mass-rebuild`. + +## javascript insertion via meta tags + +Raúl Benencia discovered an additional XSS exposure in the meta plugin. +([[!cve CVE-2012-0220]]) + +This hole was discovered on 16 May 2012 and fixed the same day with +the release of ikiwiki 3.20120516. A fix was backported to Debian squeeze, +as version 3.20100815.9. An upgrade is recommended for all sites.