ALT-BU-2022-6831-1
Branch sisyphus_mipsel update bulletin.
Package nextcloud updated to version 25.0.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-39329
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server and Nextcloud Enterprise Server prior to versions 23.0.9 and 24.0.5 are vulnerable to exposure of information that cannot be controlled by administrators without direct database access. Versions 23.0.9 and 24.0.5 contains patches for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8f3p-rcm5-mrg3
- https://github.com/nextcloud/server/pull/33643
- https://github.com/nextcloud/server/pull/33643
- https://hackerone.com/reports/1675014
- https://hackerone.com/reports/1675014
Modified: 2024-11-21
CVE-2022-39330
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server prior to versions 22.2.10, 23.0.10, and 24.0.6 are vulnerable to a logged-in attacker slowing down the system by generating a lot of database/cpu load. Nextcloud Server versions 23.0.10 and 24.0.6 and Nextcloud Enterprise Server versions 22.2.10, 23.0.10, and 24.0.6 contain patches for this issue. As a workaround, disable the Circles app.
- https://github.com/nextcloud/circles/pull/1147
- https://github.com/nextcloud/circles/pull/1147
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-wxx7-w5p4-7x4c
- https://hackerone.com/reports/1688199
- https://hackerone.com/reports/1688199
Modified: 2024-11-21
CVE-2022-39364
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. In Nextcloud Server prior to versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server prior to versions 22.2.10.5, 23.0.9, and 24.0.5 an attacker reading `nextcloud.log` may gain knowledge of credentials to connect to a SharePoint service. Nextcloud Server versions 23.0.9 and 24.0.5 and Nextcloud Enterprise Server versions 22.2.10.5, 23.0.9, and 24.0.5 contain a patch for this issue. As a workaround, set `zend.exception_ignore_args = On` as an option in `php.ini`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpf5-jj85-36h5
- https://github.com/nextcloud/server/pull/33689
- https://github.com/nextcloud/server/pull/33689
- https://github.com/nextcloud/sharepoint/issues/141
- https://github.com/nextcloud/sharepoint/issues/141
- https://hackerone.com/reports/1652903
- https://hackerone.com/reports/1652903
Modified: 2024-11-21
CVE-2022-41968
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.10 and 24.0.5, calendar name lengths are not validated before writing to a database. As a result, an attacker can send unnecessary amounts of data against the database. Version 23.0.10 and 24.0.5 contain patches for the issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m92j-xxc8-hq3v
- https://github.com/nextcloud/server/pull/33139
- https://github.com/nextcloud/server/pull/33139
- https://hackerone.com/reports/1596148
- https://hackerone.com/reports/1596148
Modified: 2024-11-21
CVE-2022-41969
Nextcloud Server is an open source personal cloud server. Prior to versions 23.0.11, 24.0.7, and 25.0.0, there is no password length limit when creating a user as an administrator. An administrator can cause a limited DoS attack against their own server. Versions 23.0.11, 24.0.7, and 25.0.0 contain a fix for the issue. As a workaround, don't create user accounts with long passwords.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4gm7-j7wg-m4fx
- https://github.com/nextcloud/server/pull/34500
- https://github.com/nextcloud/server/pull/34500
- https://hackerone.com/reports/1727424
- https://hackerone.com/reports/1727424
Modified: 2024-11-21
CVE-2023-25162
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Nextcloud Server prior to 24.0.8 and 23.0.12 and Nextcloud Enterprise server prior to 24.0.8 and 23.0.12 are vulnerable to server-side request forgery (SSRF). Attackers can leverage enclosed alphanumeric payloads to bypass IP filters and gain SSRF, which would allow an attacker to read crucial metadata if the server is hosted on the AWS platform. Nextcloud Server 24.0.8 and 23.0.2 and Nextcloud Enterprise Server 24.0.8 and 23.0.12 contain a patch for this issue. No known workarounds are available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mqrx-grp7-244m
- https://github.com/nextcloud/server/pull/34160
- https://github.com/nextcloud/server/pull/34160
- https://hackerone.com/reports/1702864
- https://hackerone.com/reports/1702864
Modified: 2024-11-21
CVE-2023-25817
Nextcloud server is an open source, personal cloud implementation. In versions from 24.0.0 and before 24.0.9 a user could escalate their permissions to delete files they were not supposed to deletable but only viewed or downloaded. This issue has been addressed andit is recommended that the Nextcloud Server is upgraded to 24.0.9. There are no known workarounds for this vulnerability.
Package samba updated to version 4.16.6-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-06493
Уязвимость функций unwrap_des() и unwrap_des3() библиотеки GSSAPI пакета Heimdal программы сетевого взаимодействия Samba
Modified: 2024-11-21
CVE-2022-3437
A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
- [oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure
- [oss-security] 20230208 [vs] heimdal: CVE-2022-45142: signature validation failure
- https://access.redhat.com/security/cve/CVE-2022-3437
- https://access.redhat.com/security/cve/CVE-2022-3437
- https://bugzilla.redhat.com/show_bug.cgi?id=2137774
- https://bugzilla.redhat.com/show_bug.cgi?id=2137774
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202309-06
- GLSA-202309-06
- GLSA-202310-06
- GLSA-202310-06
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://security.netapp.com/advisory/ntap-20230216-0008/
- https://www.samba.org/samba/security/CVE-2022-3437.html
- https://www.samba.org/samba/security/CVE-2022-3437.html
Package openslp updated to version 2.0.0-alt3 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4217
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
- https://access.redhat.com/security/cve/CVE-2021-4217
- https://access.redhat.com/security/cve/CVE-2021-4217
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
- https://bugzilla.redhat.com/show_bug.cgi?id=2044583
- https://bugzilla.redhat.com/show_bug.cgi?id=2044583
Package wolfssl updated to version 5.5.2-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2023-00042
Уязвимость библиотеки SSL/TLS WolfSSL связана с возможностью чтения за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-42905
In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)
- http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html
- http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html
- 20230119 wolfSSL before 5.5.2: Heap-buffer over-read with WOLFSSL_CALLBACKS
- 20230119 wolfSSL before 5.5.2: Heap-buffer over-read with WOLFSSL_CALLBACKS
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- https://github.com/wolfSSL/wolfssl/releases
- https://github.com/wolfSSL/wolfssl/releases
- https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.2-stable
- https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.2-stable
- https://www.wolfssl.com/docs/security-vulnerabilities/
- https://www.wolfssl.com/docs/security-vulnerabilities/
Package expat updated to version 2.5.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2023-02688
Уязвимость функции XML_ExternalEntityParserCreate библиотеки синтаксического анализатора XML libexpat, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-43680
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations.
- [oss-security] 20231228 CVE-2022-43680: Apache OpenOffice: "Use after free" fixed in libexpat
- [oss-security] 20231228 CVE-2022-43680: Apache OpenOffice: "Use after free" fixed in libexpat
- [oss-security] 20240103 CVE-2022-43680: Apache OpenOffice: "Use after free" fixed in libexpat
- [oss-security] 20240103 CVE-2022-43680: Apache OpenOffice: "Use after free" fixed in libexpat
- https://github.com/libexpat/libexpat/issues/649
- https://github.com/libexpat/libexpat/issues/649
- https://github.com/libexpat/libexpat/pull/616
- https://github.com/libexpat/libexpat/pull/616
- https://github.com/libexpat/libexpat/pull/650
- https://github.com/libexpat/libexpat/pull/650
- [debian-lts-announce] 20221028 [SECURITY] [DLA 3165-1] expat security update
- [debian-lts-announce] 20221028 [SECURITY] [DLA 3165-1] expat security update
- FEDORA-2022-3cf0e7ebc7
- FEDORA-2022-3cf0e7ebc7
- FEDORA-2022-ae2559a8f4
- FEDORA-2022-ae2559a8f4
- FEDORA-2022-49db80f821
- FEDORA-2022-49db80f821
- FEDORA-2022-c43235716e
- FEDORA-2022-c43235716e
- FEDORA-2022-f3a939e960
- FEDORA-2022-f3a939e960
- FEDORA-2022-5f1e2e9016
- FEDORA-2022-5f1e2e9016
- GLSA-202210-38
- GLSA-202210-38
- https://security.netapp.com/advisory/ntap-20221118-0007/
- https://security.netapp.com/advisory/ntap-20221118-0007/
- DSA-5266
- DSA-5266