|
|
Subscribe / Log in / New account

Mageia alert MGASA-2015-0057 (moodle)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2015-0057: Updated moodle packages fix CVE-2015-1493
Date:  Mon, 9 Feb 2015 22:44:38 +0100
Message-ID:  <20150209214438.9984A40C98@valstar.mageia.org>

MGASA-2015-0057 - Updated moodle packages fix CVE-2015-1493 Publication date: 09 Feb 2015 URL: http://advisories.mageia.org/MGASA-2015-0057.html Type: security Affected Mageia releases: 4 CVE: CVE-2015-1493 Description: Updated moodle package fixes security vulnerability: In Moodle before 2.6.8, parameter "file" passed to scripts serving JS was not always cleaned from including "../" in the path, allowing to read files located outside of moodle directory. All OS's are affected, but especially vulnerable are Windows servers (CVE-2015-1493). References: - https://bugs.mageia.org/show_bug.cgi?id=15244 - https://moodle.org/mod/forum/discuss.php?d=279956 - https://docs.moodle.org/dev/Moodle_2.6.8_release_notes - https://moodle.org/mod/forum/discuss.php?d=279502 - http://openwall.com/lists/oss-security/2015/02/09/5 - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1493 SRPMS: - 4/core/moodle-2.6.8-1.mga4


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds