Hide Forgot
It was reported [1],[2] that mwlib suffered from a flaw that could allow a remote attacker to perform a denial of service attack on a mwlib installation by forcing it to parse a specially-crafted #iferror magic function. This has been corrected [3] in upstream version 0.13.5. [1] http://groups.google.com/group/mwlib/browse_thread/thread/c2bd1cee77a8a79?hl=en [2] http://www.google.com/url?sa=D&q=https://github.com/pediapress/mwlib/pull/10&usg=AFQjCNHgoXQUYFtEj0L8VP5K8Xn_GoTOyw [3] https://github.com/pediapress/mwlib/commit/aa987c281c10e29f26aa0faa21c04f3bb1167fde
Created python-mwlib tracking bugs for this issue Affects: fedora-all [bug 800066] Affects: epel-5 [bug 800067]
CVE request: http://www.openwall.com/lists/oss-security/2012/03/05/16