2024-04-16 14:26:14 +00:00

251 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20241230",
"Version": "oval:org.altlinux.errata:def:20241230",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-1230: package `nextcloud` update to version 27.1.4-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-1230",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-1230",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-07159",
"RefURL": "https://bdu.fstec.ru/vul/2023-07159",
"Source": "BDU"
},
{
"RefID": "BDU:2024-00716",
"RefURL": "https://bdu.fstec.ru/vul/2024-00716",
"Source": "BDU"
},
{
"RefID": "BDU:2024-00717",
"RefURL": "https://bdu.fstec.ru/vul/2024-00717",
"Source": "BDU"
},
{
"RefID": "CVE-2023-45148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-45148",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48239",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48239",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48301",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48301",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48302",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48302",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48303",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48303",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48304",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48304",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48305",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48305",
"Source": "CVE"
},
{
"RefID": "CVE-2023-48306",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-48306",
"Source": "CVE"
}
],
"Description": "This update upgrades nextcloud to version 27.1.4-alt1. \nSecurity Fix(es):\n\n * BDU:2023-07159: Уязвимость компонента Memcached облачного программного обеспечения для создания и использования хранилища данных Nextcloud, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2024-00716: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud Server , связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку\n\n * BDU:2024-00717: Уязвимость облачного программного обеспечения для создания и использования хранилища данных Nextcloud Server , связанная с незашифрованным хранением критичной информации, позволяющая нарушителю раскрыть пароли произвольных пользователей\n\n * CVE-2023-45148: Nextcloud is an open source home cloud server. When Memcached is used as `memcache.distributed` the rate limiting in Nextcloud Server could be reset unexpectedly resetting the rate count earlier than intended. Users are advised to upgrade to versions 25.0.11, 26.0.6 or 27.1.0. Users unable to upgrade should change their config setting `memcache.distributed` to `\\OC\\Memcache\\Redis` and install Redis instead of Memcached.\n\n * CVE-2023-48239: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and starting in version 20.0.0 and prior to versions 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Enterprise Server, a malicious user could update any personal or global external storage, making them inaccessible for everyone else as well. Nextcloud Server 25.0.13, 26.0.8, and 27.1.3 and Nextcloud Enterprise Server is upgraded to 20.0.14.16, 21.0.9.13, 22.2.10.15, 23.0.12.12, 24.0.12.8, 25.0.13, 26.0.8, and 27.1.3 contain a patch for this issue. As a workaround, disable app files_external. This workaround also makes the external storage inaccessible but retains the configurations until a patched version has been deployed.\n\n * CVE-2023-48301: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, an attacker could insert links into circles name that would be opened when clicking the circle name in a search filter. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app circles.\n\n * CVE-2023-48302: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.13, 26.0.8, and 27.1.3 of Nextcloud Server and Nextcloud Enterprise Server, when a user is tricked into copy pasting HTML code without markup (Ctrl+Shift+V) the markup will actually render. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.13, 26.0.8, and 27.1.3 contain a fix for this issue. As a workaround, disable app text.\n\n * CVE-2023-48303: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, admins can change authentication details of user configured external storage. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. No known workarounds are available.\n\n * CVE-2023-48304: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, an attacker could enable and disable the birthday calendar for any user on the same server. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.\n\n * CVE-2023-48305: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and Nextcloud Enterprise Server, when the log level was set to debug, the user_ldap app logged user passwords in plaintext into the log file. If the log file was then leaked or shared in any way the users' passwords would be leaked. Nextcloud Server and Nextcloud Enterprise Server versions 25.0.11, 26.0.6, and 27.1.0 contain a patch for this issue. As a workaround, change config setting `loglevel` to `1` or higher (should always be higher than 1 in production environments).\n\n * CVE-2023-48306: Nextcloud Server provides data storage for Nextcloud, an open source cloud platform. Starting in version 25.0.0 and prior to versions 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Server and starting in version 22.0.0 and prior to versions 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 of Nextcloud Enterprise Server, the DNS pin middleware was vulnerable to DNS rebinding allowing an attacker to perform SSRF as a final result. Nextcloud Server 25.0.11, 26.0.6, and 27.1.0 and Nextcloud Enterprise Server 22.2.10.16, 23.0.12.11, 24.0.12.7, 25.0.11, 26.0.6, and 27.1.0 contain patches for this issue. No known workarounds are available.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-01-30"
},
"Updated": {
"Date": "2024-01-30"
},
"BDUs": [
{
"ID": "BDU:2023-07159",
"CVSS": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-307",
"Href": "https://bdu.fstec.ru/vul/2023-07159",
"Impact": "Low",
"Public": "20231016"
},
{
"ID": "BDU:2024-00716",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-918",
"Href": "https://bdu.fstec.ru/vul/2024-00716",
"Impact": "Critical",
"Public": "20231121"
},
{
"ID": "BDU:2024-00717",
"CVSS": "AV:L/AC:L/Au:M/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-312",
"Href": "https://bdu.fstec.ru/vul/2024-00717",
"Impact": "Low",
"Public": "20231121"
}
],
"CVEs": [
{
"ID": "CVE-2023-45148",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CWE": "CWE-307",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-45148",
"Impact": "Low",
"Public": "20231016"
},
{
"ID": "CVE-2023-48239",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48239",
"Impact": "High",
"Public": "20231121"
},
{
"ID": "CVE-2023-48301",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48301",
"Impact": "Low",
"Public": "20231121"
},
{
"ID": "CVE-2023-48302",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48302",
"Impact": "Low",
"Public": "20231121"
},
{
"ID": "CVE-2023-48303",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48303",
"Impact": "Low",
"Public": "20231121"
},
{
"ID": "CVE-2023-48304",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-639",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48304",
"Impact": "Low",
"Public": "20231121"
},
{
"ID": "CVE-2023-48305",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-312",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48305",
"Impact": "Low",
"Public": "20231121"
},
{
"ID": "CVE-2023-48306",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-918",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-48306",
"Impact": "Critical",
"Public": "20231121"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20241230001",
"Comment": "nextcloud is earlier than 0:27.1.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241230002",
"Comment": "nextcloud-apache2 is earlier than 0:27.1.4-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20241230003",
"Comment": "nextcloud-nginx is earlier than 0:27.1.4-alt1"
}
]
}
]
}
}
]
}