ALT-BU-2024-16679-1
Branch sisyphus_e2k update bulletin.
Package tuned updated to version 2.24.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-10469
Уязвимость функции instance_create программы для мониторинга и адаптивной настройки системных устройств tuned, позволяющая нарушителю выполнить произвольный код
Modified: 2025-02-03
CVE-2024-52336
A script injection vulnerability was identified in the Tuned package. The `instance_create()` D-Bus function can be called by locally logged-in users without authentication. This flaw allows a local non-privileged user to execute a D-Bus call with `script_pre` or `script_post` options that permit arbitrary scripts with their absolute paths to be passed. These user or attacker-controlled executable scripts or programs could then be executed by Tuned with root privileges that could allow attackers to local privilege escalation.
- RHSA-2024:10384
- RHSA-2025:0879
- RHSA-2025:0880
- https://access.redhat.com/security/cve/CVE-2024-52336
- RHBZ#2324540
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://www.openwall.com/lists/oss-security/2024/11/28/1
- https://www.openwall.com/lists/oss-security/2024/11/28/2
Modified: 2025-02-25
CVE-2024-52337
A log spoofing flaw was found in the Tuned package due to improper sanitization of some API arguments. This flaw allows an attacker to pass a controlled sequence of characters; newlines can be inserted into the log. Instead of the 'evil' the attacker could mimic a valid TuneD log line and trick the administrator. The quotes '' are usually used in TuneD logs citing raw user input, so there will always be the ' character ending the spoofed input, and the administrator can easily overlook this. This logged string is later used in logging and in the output of utilities, for example, `tuned-adm get_instances` or other third-party programs that use Tuned's D-Bus interface for such operations.
- RHSA-2024:10381
- RHSA-2024:10384
- RHSA-2024:11161
- RHSA-2025:0195
- RHSA-2025:0327
- RHSA-2025:0368
- RHSA-2025:0879
- RHSA-2025:0880
- RHSA-2025:0881
- RHSA-2025:1785
- RHSA-2025:1802
- https://access.redhat.com/security/cve/CVE-2024-52337
- RHBZ#2324541
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
- https://www.openwall.com/lists/oss-security/2024/11/28/1
- https://www.openwall.com/lists/oss-security/2024/11/28/2
- https://security.opensuse.org/2024/11/26/tuned-instance-create.html
Closed bugs
перегружен зависимостями
поддержка installkernel из bootloader-utils
Package libjxl updated to version 0.11.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-10487
Уязвимость декодера JPEG XL библиотеки Libjxl, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2024-11403
There exists an out of bounds read/write in LibJXL versions prior to commit 9cc451b91b74ba470fd72bd48c121e9f33d24c99. The JPEG decoder used by the JPEG XL encoder when doing JPEG recompression (i.e. if using JxlEncoderAddJPEGFrame on untrusted input) does not properly check bounds in the presence of incomplete codes. This could lead to an out-of-bounds write. In jpegli which is released as part of the same project, the same vulnerability is present. However, the relevant buffer is part of a bigger structure, and the code makes no assumptions on the values that could be overwritten. The issue could however cause jpegli to read uninitialised memory, or addresses of functions.
CVE-2024-11498
There exists a stack buffer overflow in libjxl. A specifically-crafted file can cause the JPEG XL decoder to use large amounts of stack space (up to 256mb is possible, maybe 512mb), potentially exhausting the stack. An attacker can craft a file that will cause excessive memory usage. We recommend upgrading past commit 65fbec56bc578b6b6ee02a527be70787bbd053b0.
Package moodle updated to version 4.5.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-06552
Уязвимость виртуальной обучающей среды Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код
BDU:2024-09425
Уязвимость виртуальной обучающей среды Moodle, связанная с отсутствием авторизации, позволяющая нарушителю удалить данные
BDU:2024-10186
Уязвимость виртуальной обучающей среды Moodle, связанная с подделкой межсайтовых запросов, позволяющая нарушителю осуществить CSRF-атаку
BDU:2024-10188
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильным ограничением имени пути к ограниченному каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2024-10189
Уязвимость виртуальной обучающей среды Moodle, связанная с раскрытием информации посредством кэширования, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2024-10190
Уязвимость виртуальной обучающей среды Moodle, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных
BDU:2024-10191
Уязвимость виртуальной обучающей среды Moodle, связанная недостатками разграничения доступа, позволяющая нарушителю скомпрометировать целевую систему
BDU:2024-10192
Уязвимость виртуальной обучающей среды Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2024-10193
Уязвимость виртуальной обучающей среды Moodle, связанная с хранением критичной информации в открытом виде, позволяющая нарушителю получить доступ конфиденциальной информации
BDU:2024-10194
Уязвимость виртуальной обучающей среды Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтового скриптинга (XSS)
BDU:2024-10225
Уязвимость виртуальной обучающей среды Moodle, связанная с незащищённым хранением конфиденциальной информации, позволяющая нарушителю получить доступ конфиденциальной информации
BDU:2024-10259
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками контроля доступа, позволяющая нарушителю получить несанкционированный доступ к ограниченным функциональным возможностям
BDU:2024-10260
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процесс аутентификации
BDU:2024-10261
Уязвимость виртуальной обучающей среды Moodle, связанная с отсутствием процедуры авторизации, позволяющая нарушителю получить несанкционированный доступ к элементам системы
BDU:2024-10262
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить несанкционированный доступ к элементам системы
BDU:2024-10263
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить несанкционированный доступ к элементам системы
BDU:2024-10264
Уязвимость виртуальной обучающей среды Moodle, связанная с недостатками механизма формирования отчетов об ошибках, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2024-10437
Уязвимость модуля core_table/dynamic виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2024-10528
Уязвимость виртуальной обучающей среды Moodle, связанная с использованием небезопасных прямых ссылок на объекты, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2024-38273
Insufficient capability checks meant it was possible for users to gain access to BigBlueButton join URLs they did not have permission to access.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://moodle.org/mod/forum/discuss.php?d=459498
- https://moodle.org/mod/forum/discuss.php?d=459498
Modified: 2024-11-21
CVE-2024-38274
Insufficient escaping of calendar event titles resulted in a stored XSS risk in the event deletion prompt.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://moodle.org/mod/forum/discuss.php?d=459499
- https://moodle.org/mod/forum/discuss.php?d=459499
Modified: 2024-11-21
CVE-2024-38275
The cURL wrapper in Moodle retained the original request headers when following redirects, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.
Modified: 2025-03-26
CVE-2024-38276
Incorrect CSRF token checks resulted in multiple CSRF risks.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://moodle.org/mod/forum/discuss.php?d=459501
- https://moodle.org/mod/forum/discuss.php?d=459501
Modified: 2024-12-04
CVE-2024-38277
A unique key should be generated for a user's QR login key and their auto-login key, so the same key cannot be used interchangeably between the two.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F7AZYR7EXV6E5SQE2GYTNQE3NOENJCQ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GHTIX55J4Q4LEOMLNEA4OZSWVEENQX7E/
- https://moodle.org/mod/forum/discuss.php?d=459502
- https://moodle.org/mod/forum/discuss.php?d=459502
Modified: 2024-11-08
CVE-2024-43425
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
Modified: 2025-02-11
CVE-2024-43426
A flaw was found in pdfTeX. Insufficient sanitizing in the TeX notation filter resulted in an arbitrary file read risk on sites where pdfTeX is available, such as those with TeX Live installed.
Modified: 2024-11-12
CVE-2024-43427
A flaw was found in moodle. When creating an export of site administration presets, some sensitive secrets and keys are not being excluded from the export, which could result in them unintentionally being leaked if the presets are shared with a third party.
Modified: 2025-02-11
CVE-2024-43428
To address a cache poisoning risk in Moodle, additional validation for local storage was required.
Modified: 2024-11-12
CVE-2024-43429
A flaw was found in moodle. Some hidden user profile fields are visible in gradebook reports, which could result in users without the "view hidden user fields" capability having access to the information.
Modified: 2024-11-12
CVE-2024-43430
A flaw was found in moodle. External API access to Quiz can override contained insufficient access control.
Modified: 2024-11-08
CVE-2024-43431
A vulnerability was found in Moodle. Insufficient capability checks made it possible to delete badges that a user does not have permission to access.
Modified: 2024-11-12
CVE-2024-43432
A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.
Modified: 2024-11-12
CVE-2024-43433
A flaw was found in moodle. Matrix room membership and power levels are incorrectly applied and revoked for suspended Moodle users.
Modified: 2024-11-08
CVE-2024-43434
The bulk message sending feature in Moodle's Feedback module's non-respondents report had an incorrect CSRF token check, leading to a CSRF vulnerability.
Modified: 2024-11-12
CVE-2024-43435
A flaw was found in moodle. Insufficient capability checks make it possible for users with access to restore glossaries in courses to restore them into the global site glossary.
Modified: 2024-11-08
CVE-2024-43436
A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators.
Modified: 2025-03-13
CVE-2024-43437
A flaw was found in moodle. Insufficient sanitizing of data when performing a restore could result in a cross-site scripting (XSS) risk from malicious backup files.
Modified: 2024-11-08
CVE-2024-43438
A flaw was found in Feedback. Bulk messaging in the activity's non-respondents report did not verify message recipients belonging to the set of users returned by the report.
Modified: 2024-11-12
CVE-2024-43439
A flaw was found in moodle. H5P error messages require additional sanitizing to prevent a reflected cross-site scripting (XSS) risk.
Modified: 2024-11-08
CVE-2024-43440
A flaw was found in moodle. A local file may include risks when restoring block backups.
Modified: 2024-11-21
CVE-2024-45689
A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.
Modified: 2024-11-27
CVE-2024-45690
A flaw was found in Moodle. Additional checks were required to ensure users can only delete their OAuth2-linked accounts.
Modified: 2024-11-21
CVE-2024-45691
A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to "magic hash" values.
Modified: 2024-11-20
CVE-2024-48896
A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site.
Modified: 2024-11-20
CVE-2024-48897
A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify.
Modified: 2024-11-20
CVE-2024-48898
A vulnerability was found in Moodle. Users with access to delete audiences from reports could delete audiences from other reports that they do not have permission to delete from.
Modified: 2024-11-21
CVE-2024-48899
A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to.
Modified: 2024-11-21
CVE-2024-48900
A vulnerability was found in Moodle. Additional checks are required to ensure users with permission to view badge recipients can only access lists of those they are intended to have access to.
Modified: 2024-11-20
CVE-2024-48901
A vulnerability was found in Moodle. Additional checks are required to ensure users can only access the schedule of a report if they have permission to edit that report.
Package curl updated to version 8.11.0-alt2 for branch sisyphus_e2k.
Closed bugs
fatal: unable to access '...': .netrc parser error
Package alt-desktop-wallpapers updated to version 11.0.1-alt1 for branch sisyphus_e2k.
Closed bugs
Изображения не отображаются в настройках фона.
Package postgrey updated to version 1.37-alt2 for branch sisyphus_e2k.
Closed bugs
Postgrey "падает" после его запуска
не работоспособный пакет postgrey