Accepted moodle 1.4.4.dfsg.1-3sarge1 (source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Fri, 24 Mar 2006 16:25:00 -0800
Source: moodle
Binary: moodle
Architecture: source all
Version: 1.4.4.dfsg.1-3sarge1
Distribution: stable-security
Urgency: high
Maintainer: Martin Schulze <joey@debian.org>
Changed-By: Micah Anderson <micah@debian.org>
Description:
moodle - Course Management System for Online Learning
Changes:
moodle (1.4.4.dfsg.1-3sarge1) stable-security; urgency=high
.
* Fix input sanitization allowing for SQL injection
[lib/adodb/server.php, CVE-2006-0146]
* Fix arbitrary php code vulnerability [lib/adodb/tests/tmssql.php,
CVE-2006-0147]
* Fix SQL injection vulnerability when using PostgreSQL
[lib/adodb/drivers/adodb-postgres64.inc.php, CVE-2006-0410]
* Fix multiple cross-site scripting (XSS) vulnerabilities
[lib/adodb/adodb-pager.inc.php, CVE-2006-0806]
Files:
5d572ce0e8c11034e62fd3a20b0f9d67 616 web optional moodle_1.4.4.dfsg.1-3sarge1.dsc
50f0618c0711a7eed3725fea0dd45109 9717561 web optional moodle_1.4.4.dfsg.1.orig.tar.gz
2868972a9a5b94eb9d8a2575e7fc4937 12159 web optional moodle_1.4.4.dfsg.1-3sarge1.diff.gz
caabcd722dd1a202e95d1bae8c751bf4 9161960 web optional moodle_1.4.4.dfsg.1-3sarge1_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEMAmCW5ql+IAeqTIRAhjiAJ0X9X4UVhSlKTqXms/V3dRnH/TrLACfVZaA
qlK9WD110wG2usTu8LUwPnQ=
=GCaz
-----END PGP SIGNATURE-----
Accepted:
moodle_1.4.4.dfsg.1-3sarge1.diff.gz
to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1.diff.gz
moodle_1.4.4.dfsg.1-3sarge1.dsc
to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1.dsc
moodle_1.4.4.dfsg.1-3sarge1_all.deb
to pool/main/m/moodle/moodle_1.4.4.dfsg.1-3sarge1_all.deb