Package: moodle
Severity: important
Version: 1.6.3-2
Tags: security

Hi,

The following SA (Secunia Advisory) id was published for Smarty, which affects 
the embedded copy shipped in moodle.

SA32329[1]:
> A vulnerability has been reported in Smarty, which can be exploited by
> malicious people to bypass certain security restrictions.
>
> The vulnerability is caused due to an error when processing data with
> embedded variables. This can be exploited to potentially execute arbitrary
> PHP code.

No patch has been published yet which completely fixes the bug. However, it 
would be better if moodle just depended on smarty and the include/require 
calls changed to use the copy provided by that package, to avoid shipping yet 
another embedded code copy.

If you fix the vulnerability please also make sure to include the SA id in the 
changelog entry.

[1]http://secunia.com/Advisories/32329/

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to