|
Message-ID: <20111107174619.GB27092@foo.fgeek.fi> Date: Mon, 7 Nov 2011 19:46:19 +0200 From: Henri Salo <henri@...v.fi> To: oss-security@...ts.openwall.com Cc: jmm@...ian.org Subject: Fwd: DSA 2338-1 moodle security update Has someone requested CVE-identifiers for these already? - Henri ----- Forwarded message from Moritz Muehlenhoff <jmm@...ian.org> ----- Date: Mon, 7 Nov 2011 18:18:55 +0100 From: Moritz Muehlenhoff <jmm@...ian.org> To: debian-security-announce@...ts.debian.org Subject: [Full-disclosure] [SECURITY] [DSA 2338-1] moodle security update User-Agent: Mutt/1.5.21 (2010-09-15) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2338-1 security@...ian.org http://www.debian.org/security/ Moritz Muehlenhoff November 07, 2011 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : moodle Vulnerability : several Problem type : remote Debian-specific: no CVE ID : not yet available Several cross-site scripting and information disclosure issues have been fixed in Moodle, a course management system for online learning: * MSA-11-0020 Continue links in error messages can lead offsite * MSA-11-0024 Recaptcha images were being authenticated from an older server * MSA-11-0025 Group names in user upload CSV not escaped * MSA-11-0026 Fields in user upload CSV not escaped * MSA-11-0031 Forms API constant issue * MSA-11-0032 MNET SSL validation issue * MSA-11-0036 Messaging refresh vulnerability * MSA-11-0037 Course section editing injection vulnerability * MSA-11-0038 Database injection protection strengthened For the stable distribution (squeeze), this problem has been fixed in version 1.9.9.dfsg2-2.1+squeeze2. For the unstable distribution (sid), this problem has been fixed in version 1.9.9.dfsg2-4. We recommend that you upgrade your moodle packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux) iEYEARECAAYFAk64EswACgkQXm3vHE4uylqZjQCg4xG5p108miVitHbsEiagUhvQ KJ0AniojypPOT9jDQ+ICyBa5+AoCI1xk =adle -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ----- End forwarded message -----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.