<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nextcloud</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2023:0083-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-04-03T14:24:07Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-04-03T14:24:07Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-04-03T14:24:07Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nextcloud</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nextcloud fixes the following issues:

- Update to 23.0.12
  See: https://nextcloud.com/changelog/#latest23

- This also fix security issues:
  - CVE-2022-35931: Password Policy app could generate passwords that would be block (boo#1203190) 
  - CVE-2022-39346: Missing length validation of user displayname allows to generate an SQL error (boo#1205802)
  - CVE-2023-25579: Potential directory traversal in OC\Files\Node\Folder::getFullPath (boo#1208591)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2023-83</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7E2FX5KGET4IYNWVYBLR7XYJMJ7SJD4/</URL>
      <Description>E-Mail link for openSUSE-SU-2023:0083-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1203190</URL>
      <Description>SUSE Bug 1203190</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1205802</URL>
      <Description>SUSE Bug 1205802</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208591</URL>
      <Description>SUSE Bug 1208591</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-35931/</URL>
      <Description>SUSE CVE CVE-2022-35931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-39346/</URL>
      <Description>SUSE CVE CVE-2022-39346 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25579/</URL>
      <Description>SUSE CVE CVE-2023-25579 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP4">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP4">
        <FullProductName ProductID="SUSE Package Hub 15 SP4">SUSE Package Hub 15 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.4">
      <Branch Type="Product Name" Name="openSUSE Leap 15.4">
        <FullProductName ProductID="openSUSE Leap 15.4" CPE="cpe:/o:opensuse:leap:15.4">openSUSE Leap 15.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-23.0.12-bp154.2.3.1">
      <FullProductName ProductID="nextcloud-23.0.12-bp154.2.3.1">nextcloud-23.0.12-bp154.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-apache-23.0.12-bp154.2.3.1">
      <FullProductName ProductID="nextcloud-apache-23.0.12-bp154.2.3.1">nextcloud-apache-23.0.12-bp154.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nextcloud-23.0.12-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:nextcloud-23.0.12-bp154.2.3.1">nextcloud-23.0.12-bp154.2.3.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-apache-23.0.12-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP4">
      <FullProductName ProductID="SUSE Package Hub 15 SP4:nextcloud-apache-23.0.12-bp154.2.3.1">nextcloud-apache-23.0.12-bp154.2.3.1 as a component of SUSE Package Hub 15 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-23.0.12-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:nextcloud-23.0.12-bp154.2.3.1">nextcloud-23.0.12-bp154.2.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-apache-23.0.12-bp154.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.4">
      <FullProductName ProductID="openSUSE Leap 15.4:nextcloud-apache-23.0.12-bp154.2.3.1">nextcloud-apache-23.0.12-bp154.2.3.1 as a component of openSUSE Leap 15.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud Password Policy is an app that enables a Nextcloud server admin to define certain rules for passwords. Prior to versions 22.2.10, 23.0.7, and 24.0.3 the random password generator may, in very rare cases, generate common passwords that the validator itself would block. Upgrade Nextcloud Server to 22.2.10, 23.0.7 or 24.0.3 to receive a patch for the issue in Password Policy. There are no known workarounds available.</Note>
    </Notes>
    <CVE>CVE-2022-35931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7E2FX5KGET4IYNWVYBLR7XYJMJ7SJD4/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-35931.html</URL>
        <Description>CVE-2022-35931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1203190</URL>
        <Description>SUSE Bug 1203190</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2022-39346</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7E2FX5KGET4IYNWVYBLR7XYJMJ7SJD4/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-39346.html</URL>
        <Description>CVE-2022-39346</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1205802</URL>
        <Description>SUSE Bug 1205802</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud server is a self hosted home cloud product. In affected versions the `OC\Files\Node\Folder::getFullPath()` function was validating and normalizing the string in the wrong order. The function is used in the `newFile()` and `newFolder()` items, which may allow to creation of paths outside of ones own space and overwriting data from other users with crafted paths. This issue has been addressed in versions 25.0.2, 24.0.8, and 23.0.12. Users are advised to upgrade. There are no known workarounds for this issue.</Note>
    </Notes>
    <CVE>CVE-2023-25579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-23.0.12-bp154.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.4:nextcloud-apache-23.0.12-bp154.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/M7E2FX5KGET4IYNWVYBLR7XYJMJ7SJD4/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25579.html</URL>
        <Description>CVE-2023-25579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208591</URL>
        <Description>SUSE Bug 1208591</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
