lp:ubuntu/quantal/mediawiki
- Get this branch:
- bzr branch lp:ubuntu/quantal/mediawiki
Branch information
- Owner:
- Ubuntu branches
- Status:
- Mature
Recent revisions
- 40. By Thorsten Glaser
-
* debian/watch: mangle the epoch away so DDPO is green again
* Break mw-ext-fckeditor, it doesn’t work with 1.19 (Closes: #689375) - 39. By Thorsten Glaser
-
[ Thorsten Glaser ]
* New upstream: security fixes for CVE-2012-4377, CVE-2012-4378,
CVE-2012-4379, CVE-2012-4380, CVE-2012-4381, CVE-2012-4382
(Closes: #686330)
* Prevent <table></table> without any <tr /> inside, globally
* Fix more cases of not checking $wgHtml5
* MW’s ID (XML) sanitiser is there for a reason, use it!
* Prevent <ul></ul> without any <li /> inside in MonoBook
* Fix invalid XHTML caused by code not honouring $wgHtml5
* Quell some PHP warnings from sloppy code
* Do the wfSuppressWarnings patch used with FusionForge right
* Add myself to Uploaders and quieten lintian a bit
* Do not replace patched jquery-tablesorter with unpatched one;
unbreaks sortable tables (Closes: #687519)
* Update versioned Breaks against fusionforge and mw-extensions[ Jonathan Wiltshire ]
* Add Recommends on mediawiki-extensions- base and php-wikidiff2 - 38. By Jonathan Wiltshire
-
* New upstream bug fix release
Closes: #672818, 677895 (CVE-2012-2698)
- debian/rules: remove all .gitignore files too, since upstream
switched to git VCS
* Remove last traces of mediaiki-math binary package
* Remove CDBS logic and dependencies and use dh
auto-sequencer instead
* Depend on debhelper >=9 and use compat level 9; this
stops dh_pysupport adding files to the build
* Do not run update debconf translations on clean
* Disable patch texvc_location.patch; this really belongs in mediawiki-math
now and especially considering <email address hidden>
* Add a versioned Breaks on fusionforge-plugin- mediawiki
* Upload to unstable - 37. By Thorsten Glaser
-
* Team upload.
* Apply SQL fix for schema search paths by Roland Mas (#673125) - 36. By Thorsten Glaser
-
* Team upload.
* Address MW security release 1.18.1-1 (Closes: #666269)
- CVE-2012-1578 MW#34212: doesn’t affect 1.15
- CVE-2012-1579 MW#34907: doesn’t affect 1.15
- CVE-2012-1580 MW#35317: doesn’t affect 1.15
- CVE-2012-1581 MW#35078: fix backported
- CVE-2012-1582 MW#35315: fix backported
* Apply some lintian cleanup - 35. By Thorsten Glaser
-
* Fix reversing IPv4 address for SORBS blacklist; patch from
Nye Liu <email address hidden> (Closes: #658672)
* Backport a method called by CVE-2011-1580.patch (Closes: #658682)
* Fix warnings issued by PHP 5.4 (Closes: #661682)
* Suggest librsvg-bin (Closes: #644731)
* Demote database server to Suggests (Closes: #617561)
* Add dansk translation (Closes: #627848) - 34. By Thorsten Glaser
-
debian/
patches/ CVE-2011- 4360.patch: remove – the information
disclosure does not happen on 1.15 and the patch would not
work anyway because the OutputPage object has no setTitle
method (this prevents a PHP fatal error when someone has no
permissions, instead reverting to the pre-1:1.15.5-4 behaviour
of showing a page asking the user to log in) - 33. By Jonathan Wiltshire
-
Security fixes from upstream:
CVE-2011-1578XSS for IE <= 6
CVE-2011-1579CSS validation error in wikitext parser
CVE-2011-1580access control checks on transwiki import feature
CVE-2011-1587fix incomplete patch for CVE-2011-1578 - 32. By Jonathan Wiltshire
-
[ Thorsten Glaser ]
* debian/patches/ fix_invalid_ sql.patch: new (Closes: #615983) [ Jonathan Wiltshire ]
* Security fixes from upstream (Closes: #650434):
CVE-2011-4360 - page titles on private wikis could be exposed
bypassing different page ids to index.php
CVE-2011-4361 - action=ajax requests were dispatched to the
relevant function without any read permission checks being done
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp:ubuntu/raring/mediawiki