Bug 1927277 (CVE-2020-25630)
Summary: | CVE-2020-25630 moodle: decompressed size of zip files leads to denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED UPSTREAM | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | gwync, igor.raits, mrehak, sergio |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in Moodle where the decompressed size of zip files was not checked against the available user quota before unzipping them, which could lead to a denial of service risk. This issue affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13, and earlier unsupported versions. This is fixed in versions 3.9.2, 3.8.5, 3.7.8, and 3.5.14.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2021-02-11 10:09:45 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1927278, 1927286 | ||
Bug Blocks: |
Description
Dhananjay Arunesh
2021-02-10 12:55:47 UTC
External References: https://moodle.org/mod/forum/discuss.php?d=410842 Created moodle tracking bugs for this issue: Affects: fedora-all [bug 1927278] Created moodle tracking bugs for this issue: Affects: epel-7 [bug 1927286] Security flaws will close automatically upon closing the last tracker. There is still a tracker for epel-7 that is open. Reopened the flaw. This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products. |