Описание
Security update for nextcloud
This update for nextcloud fixes the following issues:
-
Update to 23.0.12 See: https://nextcloud.com/changelog/#latest23
-
This also fix security issues:
- CVE-2022-35931: Password Policy app could generate passwords that would be block (boo#1203190)
- CVE-2022-39346: Missing length validation of user displayname allows to generate an SQL error (boo#1205802)
- CVE-2023-25579: Potential directory traversal in OC\Files\Node\Folder::getFullPath (boo#1208591)
Список пакетов
SUSE Package Hub 15 SP4
openSUSE Leap 15.4
Ссылки
- E-Mail link for openSUSE-SU-2023:0083-1
- SUSE Security Ratings
- SUSE Bug 1203190
- SUSE Bug 1205802
- SUSE Bug 1208591
- SUSE CVE CVE-2022-35931 page
- SUSE CVE CVE-2022-39346 page
- SUSE CVE CVE-2023-25579 page
Описание
Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available.
Затронутые продукты
Ссылки
- CVE-2022-35931
- SUSE Bug 1203190
Описание
Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
Затронутые продукты
Ссылки
- CVE-2022-39346
- SUSE Bug 1205802
Описание
Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.
Затронутые продукты
Ссылки
- CVE-2023-25579
- SUSE Bug 1208591