Bug 14139 - Updated php-pear-CAS packages fix security vulnerabilities
Summary: Updated php-pear-CAS packages fix security vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 4
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/611993/
Whiteboard: MGA3TOO has_procedure advisory mga3-3...
Keywords: validated_update
Depends on: 14081
Blocks:
  Show dependency treegraph
 
Reported: 2014-09-22 13:22 CEST by claire robinson
Modified: 2014-09-24 18:44 CEST (History)
5 users (show)

See Also:
Source RPM: php-pear-CAS-1.3.3-1.mga4.src.rpm
CVE:
Status comment:


Attachments

Description claire robinson 2014-09-22 13:22:31 CEST
+++ This bug was initially created as a clone of Bug #14081 +++

Advisory:
========================

Updated php-pear-CAS packages fix security vulnerabilities:

A flaw in php-pear-CAS before 1.3.3, utilized by Moodle, has been found which
could potentially allow unauthorised access and privilege escalation
(CVE-2014-4172).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4172
========================

Updated packages in core/updates_testing:
========================

php-pear-CAS-1.3.3-1.mga3

php-pear-CAS-1.3.3-1.mga4

from SRPMS:

php-pear-CAS-1.3.3-1.mga3.src.rpm

php-pear-CAS-1.3.3-1.mga4.src.rpm
claire robinson 2014-09-22 13:24:12 CEST

Whiteboard: (none) => MGA3TOO has_procedure advisory mga3-32-ok MGA4-32-OK

Comment 1 claire robinson 2014-09-22 13:30:53 CEST
Validating from bug 14081. Advisory uploaded but may need extra references.

Could sysadmin please push to 3 & 4 updates

Thanks

Keywords: (none) => validated_update

Comment 2 Mageia Robot 2014-09-24 18:44:58 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2014-0387.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.