[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted moodle 1.4.4.dfsg.1-3sarge1 (source all)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 24 Mar 2006 16:25:00 -0800
Source: moodle
Binary: moodle
Architecture: source all
Version: 1.4.4.dfsg.1-3sarge1
Distribution: stable-security
Urgency: high
Maintainer: Martin Schulze <joey@debian.org>
Changed-By: Micah Anderson <micah@debian.org>
Description: 
 moodle     - Course Management System for Online Learning
Changes: 
 moodle (1.4.4.dfsg.1-3sarge1) stable-security; urgency=high
 .
   * Fix input sanitization allowing for SQL injection
     [lib/adodb/server.php, CVE-2006-0146]
   * Fix arbitrary php code vulnerability [lib/adodb/tests/tmssql.php,
     CVE-2006-0147]
   * Fix SQL injection vulnerability when using PostgreSQL
     [lib/adodb/drivers/adodb-postgres64.inc.php, CVE-2006-0410]
   * Fix multiple cross-site scripting (XSS) vulnerabilities
     [lib/adodb/adodb-pager.inc.php, CVE-2006-0806]
Files: 
 5d572ce0e8c11034e62fd3a20b0f9d67 616 web optional moodle_1.4.4.dfsg.1-3sarge1.dsc
 50f0618c0711a7eed3725fea0dd45109 9717561 web optional moodle_1.4.4.dfsg.1.orig.tar.gz
 2868972a9a5b94eb9d8a2575e7fc4937 12159 web optional moodle_1.4.4.dfsg.1-3sarge1.diff.gz
 caabcd722dd1a202e95d1bae8c751bf4 9161960 web optional moodle_1.4.4.dfsg.1-3sarge1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEMAmCW5ql+IAeqTIRAhjiAJ0X9X4UVhSlKTqXms/V3dRnH/TrLACfVZaA
qlK9WD110wG2usTu8LUwPnQ=
=GCaz
-----END PGP SIGNATURE-----


Accepted:
moodle_1.4.4.dfsg.1-3sarge1.diff.gz
  to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1.diff.gz
moodle_1.4.4.dfsg.1-3sarge1.dsc
  to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1.dsc
moodle_1.4.4.dfsg.1-3sarge1_all.deb
  to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1_all.deb



Reply to: