Francois Marier
2008-Dec-18 01:52 UTC
[Secure-testing-team] Many security fixes in moodle 1.8.2.dfsg-2
Hello, Please disregard my previous email about Moodle 1.8.2.dfsg-1. That package accidentally introduced a new vulnerability. We have fixed that one and have gone through all of the Moodle security advisory to make sure that we have not missed any issues. It turns out we were missing quite a few. So I have uploaded 1.8.2.dfsg-2 (to unstable) which fixes all of them: moodle (1.8.2.dfsg-2) unstable; urgency=high [ Dan Poltawski ] * Patch SQL injection bug in hotpot module (MSA-08-0010) * Fix XSS bug in logged urls (MDL-11414) * Fix XSS bug in install script (MSA-08-0004) * Fix insufficient access control in Login as feature (MSA-08-0003) * Profiles of deleted users were accessible allowing for spam (MSA-08-0015) * Deficincy in text cleaning functions allowed for XSS (MSA-08-0021) * Fix CSRF in messaging settings (MSA-08-0023) * Fix anonymous group creation and html injection (MDL-11759) * Fix SQL injection bug in mnet (MDL-9288) * Fix SQL injection bug in restore (MDL-11857) * Insufficient cleaning of essay questions (MDL-12079) * Fix insufficient cleaning of PARAM_HOST (MDL-12793) * Fix XSS bug in logged urls (MDL-11414) * Fix uncleaned params in wiki (MDL-14806) [ Francois Marier ] * Update html2text to prevent code execution attacks (closes: #508909) -- Francois Marier <francois at debian.org> Wed, 17 Dec 2008 13:37:10 +1300 Please let me know whether you want me to go ahead and request a freeze exception or whether I should instead upload to the testing security queue. Note that the upstream source has changed since we had to remove a non-free library. Cheers, Francois