396 lines
18 KiB
JSON
396 lines
18 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20203060",
|
|
"Version": "oval:org.altlinux.errata:def:20203060",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2020-3060: package `nextcloud` update to version 20.0.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p10"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2020-3060",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-3060",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15613",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15613",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15616",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15616",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15617",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15617",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15619",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15619",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15621",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15621",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2019-15623",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15623",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8118",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8118",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8119",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8119",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8138",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8138",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8139",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8139",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8150",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8150",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8152",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8152",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8154",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8154",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8155",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8155",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8173",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8173",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8183",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8183",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8236",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8236",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8259",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8259",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8295",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8295",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2020-8296",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8296",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades nextcloud to version 20.0.0-alt1. \nSecurity Fix(es):\n\n * CVE-2019-15613: A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.\n\n * CVE-2019-15616: Dangling remote share attempts in Nextcloud 16 allow a DNS pollution when running long.\n\n * CVE-2019-15617: A missing check in Nextcloud Server 17.0.0 allowed an attacker to set up a new second factor when trying to login.\n\n * CVE-2019-15619: Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.\n\n * CVE-2019-15621: Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.\n\n * CVE-2019-15623: Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.\n\n * CVE-2020-8118: An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.\n\n * CVE-2020-8119: Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.\n\n * CVE-2020-8138: A missing check for IPv4 nested inside IPv6 in Nextcloud server \u003c 17.0.1, \u003c 16.0.7, and \u003c 15.0.14 allowed a Server-Side Request Forgery (SSRF) vulnerability when subscribing to a malicious calendar URL.\n\n * CVE-2020-8139: A missing access control check in Nextcloud Server \u003c 18.0.1, \u003c 17.0.4, and \u003c 16.0.9 causes hide-download shares to be downloadable when appending /download to the URL.\n\n * CVE-2020-8150: A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.\n\n * CVE-2020-8152: Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.\n\n * CVE-2020-8154: An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.\n\n * CVE-2020-8155: An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.\n\n * CVE-2020-8173: A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.\n\n * CVE-2020-8183: A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.\n\n * CVE-2020-8236: A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.\n\n * CVE-2020-8259: Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.\n\n * CVE-2020-8295: A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.\n\n * CVE-2020-8296: Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.\n\n * #36902: You are using a fallback implementation of the intl extension\n\n * #39028: Собрать актуальную версию v20.0.x",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2020-10-15"
|
|
},
|
|
"Updated": {
|
|
"Date": "2020-10-15"
|
|
},
|
|
"BDUs": null,
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2019-15613",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-345",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15613",
|
|
"Impact": "High",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15616",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-74",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15616",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15617",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15617",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15619",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15619",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15621",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-281",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15621",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2019-15623",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15623",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8118",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"CWE": "CWE-918",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8118",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8119",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-863",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8119",
|
|
"Impact": "Low",
|
|
"Public": "20200204"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8138",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-918",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8138",
|
|
"Impact": "Low",
|
|
"Public": "20200320"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8139",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-862",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8139",
|
|
"Impact": "Low",
|
|
"Public": "20200320"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8150",
|
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-311",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8150",
|
|
"Impact": "Low",
|
|
"Public": "20201109"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8152",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-522",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8152",
|
|
"Impact": "Low",
|
|
"Public": "20201116"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8154",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
|
"CWE": "CWE-639",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8154",
|
|
"Impact": "High",
|
|
"Public": "20200512"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8155",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8155",
|
|
"Impact": "Low",
|
|
"Public": "20200512"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8173",
|
|
"CVSS": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-311",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8173",
|
|
"Impact": "Low",
|
|
"Public": "20201102"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8183",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-522",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8183",
|
|
"Impact": "High",
|
|
"Public": "20201102"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8236",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-287",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8236",
|
|
"Impact": "Low",
|
|
"Public": "20201102"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8259",
|
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-522",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8259",
|
|
"Impact": "High",
|
|
"Public": "20201116"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8295",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8295",
|
|
"Impact": "High",
|
|
"Public": "20210126"
|
|
},
|
|
{
|
|
"ID": "CVE-2020-8296",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-521",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8296",
|
|
"Impact": "Low",
|
|
"Public": "20210303"
|
|
}
|
|
],
|
|
"Bugzilla": [
|
|
{
|
|
"ID": "36902",
|
|
"Href": "https://bugzilla.altlinux.org/36902",
|
|
"Data": "You are using a fallback implementation of the intl extension"
|
|
},
|
|
{
|
|
"ID": "39028",
|
|
"Href": "https://bugzilla.altlinux.org/39028",
|
|
"Data": "Собрать актуальную версию v20.0.x"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:10",
|
|
"cpe:/o:alt:workstation:10",
|
|
"cpe:/o:alt:server:10",
|
|
"cpe:/o:alt:server-v:10",
|
|
"cpe:/o:alt:education:10",
|
|
"cpe:/o:alt:slinux:10",
|
|
"cpe:/o:alt:starterkit:p10",
|
|
"cpe:/o:alt:kworkstation:10.1",
|
|
"cpe:/o:alt:workstation:10.1",
|
|
"cpe:/o:alt:server:10.1",
|
|
"cpe:/o:alt:server-v:10.1",
|
|
"cpe:/o:alt:education:10.1",
|
|
"cpe:/o:alt:slinux:10.1",
|
|
"cpe:/o:alt:starterkit:10.1",
|
|
"cpe:/o:alt:kworkstation:10.2",
|
|
"cpe:/o:alt:workstation:10.2",
|
|
"cpe:/o:alt:server:10.2",
|
|
"cpe:/o:alt:server-v:10.2",
|
|
"cpe:/o:alt:education:10.2",
|
|
"cpe:/o:alt:slinux:10.2",
|
|
"cpe:/o:alt:starterkit:10.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:2001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20203060001",
|
|
"Comment": "nextcloud is earlier than 0:20.0.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20203060002",
|
|
"Comment": "nextcloud-apache2 is earlier than 0:20.0.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20203060003",
|
|
"Comment": "nextcloud-nginx is earlier than 0:20.0.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |