[Pkg-mediawiki-commits] r402 - mediawiki/trunk/debian

Thorsten Glaser tg at alioth.debian.org
Thu Dec 13 10:15:47 UTC 2012


Author: tg
Date: 2012-12-13 10:15:47 +0000 (Thu, 13 Dec 2012)
New Revision: 402

Modified:
   mediawiki/trunk/debian/README.Debian
   mediawiki/trunk/debian/changelog
Log:
lintian says?\194?\160?\226?\128?\156privilege?\226?\128?\157 is spelt without a ?\226?\128?\152d?\226?\128?\153


Modified: mediawiki/trunk/debian/README.Debian
===================================================================
--- mediawiki/trunk/debian/README.Debian	2012-12-13 09:37:17 UTC (rev 401)
+++ mediawiki/trunk/debian/README.Debian	2012-12-13 10:15:47 UTC (rev 402)
@@ -16,19 +16,19 @@
 	The configuration uses an easy web-based system ; just go to this URL :
 		http://www.myserver.org/mediawiki/config/index.php
 		(replace by your own servername)
-	  You may of course configure your webserver to serve this URL. A default 
+	  You may of course configure your webserver to serve this URL. A default
 	  configuration can be found in /etc/mediawiki/. Apache and cherokee users
 	  may have linked this in their configuration automatically if they asked
 	  the installer to do so.
 	Then just copy the generated config to the real system location :
 		mv /var/lib/mediawiki/config/LocalSettings.php \
 		 /etc/mediawiki
-	You should change file permissions for LocalSettings.php as required to 
-	prevent other users on the server from reading passwords and 
+	You should change file permissions for LocalSettings.php as required to
+	prevent other users on the server from reading passwords and
 	altering configuration data.
 	.
-	Warning: to make this work, we have to define MW_INSTALL_PATH. This is done 
-	automatically in this package. However, you may change this later if you plan 
+	Warning: to make this work, we have to define MW_INSTALL_PATH. This is done
+	automatically in this package. However, you may change this later if you plan
 	to set up multisite wikis.
 	After being configured, you should begin your surf on your new wiki using this url:
 		http://www.myserver.org/mediawiki
@@ -36,8 +36,8 @@
 	Enjoy !!!
 
 Security concerns:
-  1) priviledge separation:
-		Once installed, you can improve security by separating sql priviledges. Thus having your standard
+  1) privilege separation:
+		Once installed, you can improve security by separating sql privileges. Thus having your standard
 	sql account be granted only SELECT/INSERT/DELETE/UPDATE on your mediawiki database, and an additional
 	account used for maintenance with additional CREATE/DROP/ALTER rights.
 		To use this feature, you only need to setup an additional account in the database and provide
@@ -49,7 +49,7 @@
 		$wgAntivirus = 'clamav';
 
 Upgrading the database:
-	When upgrading to new releases, the database may need an upgrade before your wiki is able to 
+	When upgrading to new releases, the database may need an upgrade before your wiki is able to
 	work. Here is a rapid sketch:
 	1) Dump your database to a text file.
 	   mysqldump --add-drop-table -u <user> -p <my-database> > /path/to/file.sql
@@ -69,11 +69,10 @@
 
 Editing and Syntax:
 	MediaWiki syntax is rather complex.
-	To prevent this README file from becoming a manual, 
+	To prevent this README file from becoming a manual,
 	we don't provide here instructions on MediaWiki syntax.
 	But you can point your browser to this page:
 	http://meta.wikimedia.org/wiki/Help:Editing
 	Where you will find all that you'd like to know about it!
 
 -- Romain Beauxis <toots at rastageeks.org> and Marc Dequènes (Duck) <Duck at DuckCorp.org>
-

Modified: mediawiki/trunk/debian/changelog
===================================================================
--- mediawiki/trunk/debian/changelog	2012-12-13 09:37:17 UTC (rev 401)
+++ mediawiki/trunk/debian/changelog	2012-12-13 10:15:47 UTC (rev 402)
@@ -1,12 +1,16 @@
 mediawiki (1:1.19.3-1) unstable; urgency=high
 
+  [ Dominik George ]
   * Team upload
-  * New upstream version fixes security issues (Closes: 694998).
+  * New upstream version fixes security issues (Closes: #694998)
     + Prevent session fixation in Special:UserLogin (CVE-2012-5391)
       https://bugzilla.wikimedia.org/show_bug.cgi?id=40995
     + Prevent linker regex from exceeding PCRE backtrack limit
       https://bugzilla.wikimedia.org/show_bug.cgi?id=41400
 
+  [ Thorsten Glaser ]
+  * Fix spelling error in README.Debian (thanks lintian!)
+
  -- Dominik George <nik at naturalnet.de>  Wed, 12 Dec 2012 09:44:08 +0100
 
 mediawiki (1:1.19.2-2) unstable; urgency=low
@@ -50,7 +54,7 @@
     auto-sequencer instead
   * Depend on debhelper >=9 and use compat level 9; this
     stops dh_pysupport adding files to the build
-  * Do not run update debconf translations on clean 
+  * Do not run update debconf translations on clean
   * Disable patch texvc_location.patch; this really belongs in mediawiki-math
     now and especially considering <1632437115.20120612191230 at gmail.com>
   * Add a versioned Breaks on fusionforge-plugin-mediawiki
@@ -229,9 +233,9 @@
 
   [ Romain Beauxis ]
   * Put debian's package version in declared version.
-    Should help sysadmins to keep track of installed 
+    Should help sysadmins to keep track of installed
     versions, in particular with regard to security
-    updates. 
+    updates.
   * Added Jonathan Wiltshire to uploaders.
   * Do not clan math dir if it does not exist (for instance
     when running clean from SVN).
@@ -278,7 +282,7 @@
   * Backported patch from revision 61090 to add a unique guid per RSS
     feed element.
   Closes: #383130
-  * Refreshed patches. 
+  * Refreshed patches.
 
  -- Romain Beauxis <toots at rastageeks.org>  Mon, 15 Mar 2010 11:41:07 -0500
 
@@ -286,7 +290,7 @@
 
   * New upstream release.
   * Ack previous NMU, thanks to Nico Golde for taking care
-    of this. 
+    of this.
 
  -- Romain Beauxis <toots at rastageeks.org>  Sun, 09 Aug 2009 10:46:41 -0500
 
@@ -300,7 +304,7 @@
 
 mediawiki (1:1.15.0-1) unstable; urgency=low
 
-  * New upstream release. 
+  * New upstream release.
   * Upstream added support for OASIS documents.
   Closes: #530328
   * Refreshed quilt patches
@@ -319,13 +323,13 @@
   * New upstream release.
   * Fixed issues in the installer:
   "A number of cross-site scripting (XSS) security vulnerabilities were
-   discovered in the web-based installer (config/index.php). 
-   These vulnerabilities all require a live installer once the installer 
+   discovered in the web-based installer (config/index.php).
+   These vulnerabilities all require a live installer once the installer
    has been used to install a wiki, it is deactivated.
 
    Note that cross-site scripting vulnerabilities can be used to attack
-   any website in the same cookie domain. So if you have an uninstalled 
-   copy of MediaWiki on the same site as an active web service, MediaWiki 
+   any website in the same cookie domain. So if you have an uninstalled
+   copy of MediaWiki on the same site as an active web service, MediaWiki
    could be used to attack the active service."
   Closes: #514547
   * Fixed typo in README.Debian
@@ -341,7 +345,7 @@
   * New upstream release.
   * Fix CVE-2008-5249: XSS vulnerability in MediaWiki:
   "An XSS vulnerability affecting all MediaWiki installations between
-   1.13.0 and 1.13.2." 
+   1.13.0 and 1.13.2."
   Closes: #508868
   * Fix CVE-2008-5250: several local script injection vulnerabilities
     in MediaWiki:
@@ -351,7 +355,7 @@
      scripting capability (such as Firefox 1.5+), for all MediaWiki
      installations with SVG uploads enabled."
   Closes: #508869
-  * Fix CVE-2008-5252: CSRF vulnerability affecting the Special:Import 
+  * Fix CVE-2008-5252: CSRF vulnerability affecting the Special:Import
     feature in MediaWiki:
   "A CSRF vulnerability affecting the Special:Import feature, for all
    MediaWiki installations since the feature was introduced in 1.3.0."
@@ -364,8 +368,8 @@
   * New upstream release
   * Fix CVE-2008-4408: XSS in mediawiki:
     "Cross-site scripting (XSS) vulnerability allows remote attackers
-     to inject arbitrary web script or HTML via the useskin parameter 
-     to an unspecified component." 
+     to inject arbitrary web script or HTML via the useskin parameter
+     to an unspecified component."
   Closes: #501115
 
  -- Romain Beauxis <toots at rastageeks.org>  Sat, 11 Oct 2008 15:02:39 +0200
@@ -400,7 +404,7 @@
 mediawiki (1:1.12.0-1) unstable; urgency=low
 
   * New upstream release
-  * Updated patch for postfix support: dropped what 
+  * Updated patch for postfix support: dropped what
     has been implemented upstream
   * Refreshed other patches, thanks to quilt
   * Changed postgresql recommends to "postgresql" package
@@ -435,7 +439,7 @@
 mediawiki (1:1.11.1-1) unstable; urgency=high
 
   * New upstream release
-  * A potential XSS injection vector affecting 
+  * A potential XSS injection vector affecting
     Microsoft Internet Explorer users has been
     closed.
 




More information about the Pkg-mediawiki-commits mailing list