Mageia alert MGASA-2015-0032 (moodle)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2015-0032: Updated moodle package fixes security vulnerabilities | |
Date: | Tue, 20 Jan 2015 15:57:55 +0100 | |
Message-ID: | <20150120145756.00E2741E37@valstar.mageia.org> |
MGASA-2015-0032 - Updated moodle package fixes security vulnerabilities Publication date: 20 Jan 2015 URL: http://advisories.mageia.org/MGASA-2015-0032.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-0211, CVE-2015-0212, CVE-2015-0213, CVE-2015-0214, CVE-2015-0215, CVE-2015-0217, CVE-2015-0218 Description: Updated moodle package fixes security vulnerabilities: In Moodle before 2.6.7, absence of a capability check in AJAX backend script in the LTI module could allow any enrolled user to search the list of registered tools (CVE-2015-0211). In Moodle before 2.6.7, the course summary on course request pending approval page was displayed to the manager unescaped and could be used for XSS attack (CVE-2015-0212). In Moodle before 2.6.7, two files in the Glossary module lacked a session key check potentially allowing cross-site request forgery (CVE-2015-0213). In Moodle before 2.6.7, through web-services it was possible to access messaging-related functions such as people search even if messaging is disabled on the site (CVE-2015-0214). In Moodle before 2.6.7, through web-services it was possible to get information about calendar events which user did not have enough permissions to see (CVE-2015-0215). In Moodle before 2.6.7, non-optimal regular expression in the multimedia filter could be exploited to create extra server load or make particular page unavailable, resulting in a denial of service (CVE-2015-0217). In Moodle before 2.6.7, it was possible to forge a request to logout users even when not authenticated through Shibboleth (CVE-2015-0218). References: - https://bugs.mageia.org/show_bug.cgi?id=15084 - https://moodle.org/mod/forum/discuss.php?d=278611 - https://moodle.org/mod/forum/discuss.php?d=278612 - https://moodle.org/mod/forum/discuss.php?d=278613 - https://moodle.org/mod/forum/discuss.php?d=278614 - https://moodle.org/mod/forum/discuss.php?d=278615 - https://moodle.org/mod/forum/discuss.php?d=278617 - https://moodle.org/mod/forum/discuss.php?d=278618 - https://docs.moodle.org/dev/Moodle_2.6.7_release_notes - https://moodle.org/mod/forum/discuss.php?d=278176 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0211 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0212 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0213 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0214 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0215 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0217 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0218 SRPMS: - 4/core/moodle-2.6.7-1.mga4