Bug 14139

Summary: Updated php-pear-CAS packages fix security vulnerabilities
Product: Mageia Reporter: claire robinson <eeeemail>
Component: SecurityAssignee: QA Team <qa-bugs>
Status: RESOLVED FIXED QA Contact: Sec team <security>
Severity: normal    
Priority: Normal CC: luigiwalser, mageia, stormi-mageia, sysadmin-bugs, thomas
Version: 4Keywords: validated_update
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: http://lwn.net/Vulnerabilities/611993/
Whiteboard: MGA3TOO has_procedure advisory mga3-32-ok MGA4-32-OK
Source RPM: php-pear-CAS-1.3.3-1.mga4.src.rpm CVE:
Status comment:
Bug Depends on: 14081    
Bug Blocks:    

Description claire robinson 2014-09-22 13:22:31 CEST
+++ This bug was initially created as a clone of Bug #14081 +++

Advisory:
========================

Updated php-pear-CAS packages fix security vulnerabilities:

A flaw in php-pear-CAS before 1.3.3, utilized by Moodle, has been found which
could potentially allow unauthorised access and privilege escalation
(CVE-2014-4172).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
========================

Updated packages in core/updates_testing:
========================

php-pear-CAS-1.3.3-1.mga3

php-pear-CAS-1.3.3-1.mga4

from SRPMS:

php-pear-CAS-1.3.3-1.mga3.src.rpm

php-pear-CAS-1.3.3-1.mga4.src.rpm
claire robinson 2014-09-22 13:24:12 CEST

Whiteboard: (none) => MGA3TOO has_procedure advisory mga3-32-ok MGA4-32-OK

Comment 1 claire robinson 2014-09-22 13:30:53 CEST
Validating from bug 14081. Advisory uploaded but may need extra references.

Could sysadmin please push to 3 & 4 updates

Thanks

Keywords: (none) => validated_update

Comment 2 Mageia Robot 2014-09-24 18:44:58 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0387.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED