More information about this security flaw is available in the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=2309940 Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.
current versions: moodle-4.5.2-1.fc42, moodle-4.4.6-1.fc41 and moodle-4.3.10-1.fc40 https://moodle.org/mod/forum/discuss.php?d=461897#p1854494 When restricting access to a Lesson activity with a password, certain passwords could be bypassed/less secure due to a loose comparison in the password checking logic. Note: this only affected passwords that are set to "magic hash" values. These are certain values where a loose comparison in the code can result in multiple values "matching" the password, instead of the expected behaviour that only an exact match for the password will be accepted. Severity/Risk: Minor Versions affected: 4.4 to 4.4.2, 4.3 to 4.3.6, 4.2 to 4.2.9, 4.1 to 4.1.12 and earlier unsupported versions Versions fixed: 4.4.3, 4.3.7, 4.2.10 and 4.1.13 Reported by: TaiYou Workaround: Avoid using passwords which are considered to be a "magic hash" value (such as those beginning with "0e" followed by digits). CVE identifier: CVE-2024-45691 Changes (main): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82365 Tracker issue: MDL-82365 Lesson activity password bypass through PHP loose comparison