<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>Security and privacy</title>
    <link>https://moodle.org/mod/forum/view.php?f=1048</link>
    <description>
How to keep your Moodle site secure and methods for increasing privacy.Please do not post security scans or vulnerability findings in this public forum. Any potential vulnerabilities can be submitted via the Security Submission form, which adheres to our Security Procedures and Responsible Disclosure Policy.
Documentation: [[Security]], [[Security FAQ]] and [[Increasing privacy in Moodle]] 


Before starting a new discussion topic, please check the [[Security FAQ]] and try a forum search.
PLEASE DO NOT PUBLISH SECURITY FINDINGS PUBLICLY.
If you discover a potential security issue, please report it via our Security Submission Form.
For more information about our security processes and responsible disclosure policy, see the Security Procedures documentation.
</description>
    <generator>Moodle</generator>
    <language>de</language>
    <copyright>(c) 2026 Moodle - Open-source learning platform | Moodle.org</copyright>
    <image>
      <url>https://moodle.org/theme/image.php/moodleorg/core/1779449693/i/rsssitelogo</url>
      <title>moodle</title>
      <link>https://moodle.org</link>
      <width>140</width>
      <height>35</height>
    </image>
    <item>
      <title>Vulnerable plugins</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=473975&amp;parent=1899866</link>
      <pubDate>Wed, 20 May 2026 11:05:06 GMT</pubDate>
      <description>von Michael Hawkins. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;Hi Niki,&lt;br /&gt;
&lt;br /&gt;
In the first instance, currently the best method is to check the &lt;a title=&quot;Auto-link&quot; href=&quot;https://moodle.org/plugins&quot;&gt;Plugins directory&lt;/a&gt; for the maintainer and reaching out directly - sometimes they are linked to our bug tracker, and other times it's more direct contact (message/email via their profile, or reaching out via Github to check how they would like the information disclosed), as they are the primary people who are able to address any issues. Failing that, we are sometimes able to assist with informing plugin maintainers where they can't be reached by other means.&lt;br /&gt;
&lt;br /&gt;
I cannot find any previous correspondence from you in the security inbox you mentioned, but please reach out via that email address again with further details, so we can try to assist you with responsible disclosure of your findings.&lt;br /&gt;
&lt;br /&gt;
It is worth noting that in the future, this process will be much easier. A security reporting mechanism is on the roadmap for Moodle Marketplace (though that feature will not be available at launch, it will be available in the future).&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=473975&amp;parent=1899866</guid>
    </item>
    <item>
      <title>Moodle vulnerabilities</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=471295&amp;parent=1899756</link>
      <pubDate>Mon, 18 May 2026 09:30:08 GMT</pubDate>
      <description>von Ryn Janecks. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;I’d also check the Moodle cache after making changes. I’ve had a few situations where things looked broken until I purged all caches and forced the theme/plugin data to rebuild properly.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=471295&amp;parent=1899756</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899533</link>
      <pubDate>Tue, 12 May 2026 13:17:34 GMT</pubDate>
      <description>von Marc Couture. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;Unless you are disabling critical system services in the kernel, I wouldn't worry too much about Moodle having any issues.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899533</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899418</link>
      <pubDate>Sat, 09 May 2026 02:14:17 GMT</pubDate>
      <description>von Visvanath Ratnaweera. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;Debian 13 &quot;Trixie&quot; has already deployed the patched kernel. Debian 6.12.86-1 (2026-05-08). And the machine booted! &lt;img class=&quot;icon emoticon&quot; alt=&quot;zwinkernd&quot; title=&quot;zwinkernd&quot; src=&quot;https://moodle.org/theme/image.php/moodleorg/core/1779449693/s/wink&quot; /&gt;&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899418</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899414</link>
      <pubDate>Fri, 08 May 2026 21:24:44 GMT</pubDate>
      <description>von Petr Skoda. &amp;nbsp;&lt;p&gt;&lt;p&gt;you'd do your testing on a staging &lt;a href=&quot;https://moodle.org/mod/glossary/showentry.php?eid=30&amp;amp;displayformat=dictionary&quot; title=&quot;Glossary of common terms: server&quot; class=&quot;glossary autolink concept glossaryid5&quot; data-entryid=&quot;30&quot;&gt;server&lt;/a&gt;, never on a production server&lt;/p&gt;
&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899414</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899410</link>
      <pubDate>Fri, 08 May 2026 16:48:38 GMT</pubDate>
      <description>von Ken Task. &amp;nbsp;&lt;p&gt;&lt;p&gt;&lt;a href=&quot;https://moodle.org/mod/glossary/showentry.php?eid=10401&amp;amp;displayformat=dictionary&quot; title=&quot;Glossary of common terms: OP&quot; class=&quot;glossary autolink concept glossaryid5&quot; data-entryid=&quot;10401&quot;&gt;OP&lt;/a&gt; has a moodle already installed and running.  OP asked if an update to the Kernel would affect the moodle app.   The checks.php script would be a quickie to see if the moodle is running ok.&lt;/p&gt;
&lt;p&gt;But since you mention a full test, where does one do that via CLI?&lt;/p&gt;
&lt;p&gt;'SoS', Ken&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899410</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899408</link>
      <pubDate>Fri, 08 May 2026 15:38:37 GMT</pubDate>
      <description>von Petr Skoda. &amp;nbsp;&lt;p&gt;&lt;p&gt;The only way to find out if server is compatible with Moodle is to run the full suite of PHPUnit and Behat tests. Environment check is for basic OS configuration validation only - it does not tell you if Moodle will actually run fine or not.&lt;/p&gt;
&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899408</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899391</link>
      <pubDate>Fri, 08 May 2026 08:44:24 GMT</pubDate>
      <description>von Sergio Rabellino. &amp;nbsp;&lt;p&gt;&lt;p&gt;From my understanding, the kernel optimisation introduced for cryptography known as copy.fail, which was found hardly buggy, does not involve Moodle in any way.&lt;/p&gt;
&lt;p&gt;But you can follow first the suggested mitigation action that can be reverted more simply if you (strangely) got some problems in Moodle, instead of going for the kernel update road.&lt;/p&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899391</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899389</link>
      <pubDate>Fri, 08 May 2026 07:59:13 GMT</pubDate>
      <description>von Visvanath Ratnaweera. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;In theory, Moodle should work when the Server requirements in its Release notes, eg. &lt;a href=&quot;https://moodledev.io/general/releases/4.5&quot; class=&quot;_blanktarget&quot;&gt;https://moodledev.io/general/releases/4.5&lt;/a&gt;, are satisfied. I doesn't react to the kernel version as long as those software it depends on do function.&lt;/div&gt;
&lt;div class=&quot;text_to_html&quot;&gt; &lt;/div&gt;
&lt;div class=&quot;text_to_html&quot;&gt;As you see here &lt;a href=&quot;https://moodle.org/mod/forum/discuss.php?d=474096&quot; class=&quot;_blanktarget&quot;&gt;https://moodle.org/mod/forum/discuss.php?d=474096&lt;/a&gt; no Moodle is still directly impacted.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899389</guid>
    </item>
    <item>
      <title>CVE-2026-31431 -  Will Moodle continue to function without problems after a kernel update?</title>
      <link>https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899388</link>
      <pubDate>Fri, 08 May 2026 07:19:32 GMT</pubDate>
      <description>von Ryotaro Yamada. &amp;nbsp;&lt;p&gt;&lt;div class=&quot;text_to_html&quot;&gt;Thank you very much for your helpful information and comments.&lt;br /&gt;
&lt;br /&gt;
I understand that kernel-5.14.0-611.49.2.el9_7 and later include the patch for AlmaLinux 9, and that you have not seen issues with Moodle on Rocky Linux 9 systems when checking with checks.php.&lt;br /&gt;
&lt;br /&gt;
I also understand that this does not provide 100% assurance for our own environment, especially because server configurations, plugins, and operational conditions may differ.&lt;br /&gt;
&lt;br /&gt;
We will use your comments as a useful reference, and we will consider applying the update first in a test environment, checking Moodle with admin/cli/checks.php -v and performing basic Moodle operation checks before updating the production servers.&lt;br /&gt;
&lt;br /&gt;
Thank you again for sharing your experience.&lt;/div&gt;&lt;/p&gt;</description>
      <guid isPermaLink="true">https://moodle.org/mod/forum/discuss.php?d=474175&amp;parent=1899388</guid>
    </item>
  </channel>
</rss>