ALT-BU-2020-4141-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2022-07408
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой введенных пользователем данных в библиотеке поставщика LTI, позволяющая нарушителю выполнять SSRF-атаки
Modified: 2024-11-21
CVE-2020-14320
In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk.
Modified: 2024-11-21
CVE-2020-14321
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able to assign themselves the manager role within that course.
Modified: 2024-11-21
CVE-2020-14322
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, yui_combo needed to limit the amount of files it can load to help mitigate the risk of denial of service.
Modified: 2024-11-21
CVE-2020-25628
The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25629
A vulnerability was found in Moodle where users with "Log in as" capability in a course context (typically, course managers) may gain access to some site administration capabilities by "logging in as" a System manager. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. This is fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25630
A vulnerability was found in Moodle where the decompressed size of zip files was not checked against available user quota before unzipping them, which could lead to a denial of service risk. This affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25631
A vulnerability was found in Moodle 3.9 to 3.9.1, 3.8 to 3.8.4 and 3.7 to 3.7.7 where it was possible to include JavaScript in a book's chapter title, which was not escaped on the "Add new chapter" page. This is fixed in 3.9.2, 3.8.5 and 3.7.8.
Modified: 2024-11-21
CVE-2020-25698
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25699
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25700
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25701
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25703
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
Modified: 2024-11-21
CVE-2022-45152
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440772
- https://moodle.org/mod/forum/discuss.php?d=440772
Modified: 2024-11-21
CVE-2023-35132
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Modified: 2024-11-21
CVE-2023-35133
An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-7943
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
Package puppetserver updated to version 6.13.0-alt2 for branch p9 in task 261410.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-7943
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
Closed bugs
Не достаточно выделенной оперативной памяти по умолчанию.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-24994
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
- https://github.com/libass/libass/issues/423
Modified: 2024-11-21
CVE-2020-26682
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://github.com/libass/libass/pull/432
- GLSA-202012-12
- GLSA-202012-12
Closed vulnerabilities
BDU:2022-00328
Уязвимость компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00336
Уязвимость функции url::recvline компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1680
- openSUSE-SU-2020:1680
- https://github.com/libproxy/libproxy/issues/134
- https://github.com/libproxy/libproxy/issues/134
- [debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
- [debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
- FEDORA-2020-2407cb0512
- FEDORA-2020-2407cb0512
- FEDORA-2020-f92d372cf1
- FEDORA-2020-f92d372cf1
- FEDORA-2020-7e1e9abf77
- FEDORA-2020-7e1e9abf77
- USN-4514-1
- USN-4514-1
- DSA-4800
- DSA-4800
Modified: 2024-11-21
CVE-2020-26154
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1680
- openSUSE-SU-2020:1680
- https://bugs.debian.org/968366
- https://bugs.debian.org/968366
- https://github.com/libproxy/libproxy/pull/126
- https://github.com/libproxy/libproxy/pull/126
- [debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update
- [debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update
- FEDORA-2020-15b775b07e
- FEDORA-2020-15b775b07e
- FEDORA-2020-941b563a80
- FEDORA-2020-941b563a80
- DSA-4800
- DSA-4800
Closed vulnerabilities
BDU:2018-00031
Уязвимость функции list_files (list.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00032
Уязвимость функции zi_short в (zipinfo.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01516
Уязвимость файла list.c архиватора Info-ZIP UnZip, позволяющая нарушителю выполнить произвольный код
BDU:2019-03340
Уязвимость файлового архиватора Info-ZIP Unzip, связанная с переполнением буфера на основе кучи, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-8139
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
Modified: 2024-11-21
CVE-2014-8140
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
Modified: 2024-11-21
CVE-2014-8141
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
Modified: 2024-11-21
CVE-2014-9636
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
- FEDORA-2015-1189
- FEDORA-2015-1189
- FEDORA-2015-1267
- FEDORA-2015-1267
- [oss-security] 20141222 Re: CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141222 Re: CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141102 unzip -t crasher
- [oss-security] 20141102 unzip -t crasher
- [oss-security] 20141103 Re: unzip -t crasher
- [oss-security] 20141103 Re: unzip -t crasher
- [oss-security] 20141222 CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141222 CVE Request: Info-ZIP unzip 6.0
- 62738
- 62738
- 62751
- 62751
- DSA-3152
- DSA-3152
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71825
- 71825
- USN-2489-1
- USN-2489-1
- GLSA-201611-01
- GLSA-201611-01
Modified: 2024-11-21
CVE-2014-9913
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
- [oss-security] 20141103 unzip -l crasher
- [oss-security] 20141103 unzip -l crasher
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- 95081
- 95081
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2024-11-21
CVE-2015-7696
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
- DSA-3386
- DSA-3386
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- 76863
- 76863
- 1034027
- 1034027
- USN-2788-1
- USN-2788-1
- USN-2788-2
- USN-2788-2
Modified: 2024-11-21
CVE-2015-7697
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
- http://sourceforge.net/p/infozip/patches/23/
- http://sourceforge.net/p/infozip/patches/23/
- DSA-3386
- DSA-3386
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- 76863
- 76863
- 1034027
- 1034027
- USN-2788-1
- USN-2788-1
- USN-2788-2
- USN-2788-2
Modified: 2024-11-21
CVE-2016-9844
Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- 94728
- 94728
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2024-11-21
CVE-2018-1000035
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
- [debian-lts-announce] 20200128 [SECURITY] [DLA 2082-1] unzip security update
- [debian-lts-announce] 20200128 [SECURITY] [DLA 2082-1] unzip security update
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- GLSA-202003-58
- GLSA-202003-58
Modified: 2024-11-21
CVE-2018-18384
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.