Updated moodle package fixes security vulnerabilities
Publication date: 05 Aug 2014Modification date: 05 Aug 2014
Type: security
Affected Mageia releases : 3 , 4
CVE: CVE-2014-3541 , CVE-2014-3542 , CVE-2014-3543 , CVE-2014-3544 , CVE-2014-3545 , CVE-2014-3546 , CVE-2014-3547 , CVE-2014-3548 , CVE-2014-3551 , CVE-2014-3553
Description
In Moodle before 2.6.4, serialised data passed by repositories could potentially contain objects defined by add-ons that could include executable code (CVE-2014-3541). In Moodle before 2.6.4, it was possible for manipulated XML files passed from LTI servers to be interpreted by Moodle to allow access to server-side files (CVE-2014-3542). In Moodle before 2.6.4, it was possible for manipulated XML files to be uploaded to the IMSCC course format or the IMSCP resource to allow access to server-side files (CVE-2014-3543). In Moodle before 2.6.4, filtering of the Skype profile field was not removing potentially harmful code (CVE-2014-3544). In Moodle before 2.6.4, it was possible to inject code into Calculated questions that would be executed on the server (CVE-2014-3545). In Moodle before 2.6.4, it was possible to get limited user information, such as user name and courses, by manipulating the URL of profile and notes pages (CVE-2014-3546). In Moodle before 2.6.4, the details of badges from external sources were not being filtered (CVE-2014-3547). In Moodle before 2.6.4, content of exception dialogues presented from AJAX calls was not being escaped before being presented to users (CVE-2014-3548). In Moodle before 2.6.4, fields in rubrics were not being correctly filtered (CVE-2014-3551). In Moodle before 2.6.4, forum was allowing users who were members of more than one group to post to all groups without the capability to access all groups (CVE-2014-3553). The moodle package has been updated to version 2.6.4, to fix these issues and other bugs.
References
- https://bugs.mageia.org/show_bug.cgi?id=13759
- https://moodle.org/mod/forum/discuss.php?d=264262
- https://moodle.org/mod/forum/discuss.php?d=264263
- https://moodle.org/mod/forum/discuss.php?d=264264
- https://moodle.org/mod/forum/discuss.php?d=264265
- https://moodle.org/mod/forum/discuss.php?d=264266
- https://moodle.org/mod/forum/discuss.php?d=264267
- https://moodle.org/mod/forum/discuss.php?d=264268
- https://moodle.org/mod/forum/discuss.php?d=264269
- https://moodle.org/mod/forum/discuss.php?d=264270
- https://moodle.org/mod/forum/discuss.php?d=264273
- http://docs.moodle.org/dev/Moodle_2.6.4_release_notes
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3541
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3542
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3543
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3544
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3545
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3546
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3547
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3548
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3551
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3553
SRPMS
3/core
- moodle-2.6.4-1.mga3
4/core
- moodle-2.6.4-1.mga4