<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nextcloud</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:0098-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-03-31T10:01:17Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-03-31T10:01:17Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-03-31T10:01:17Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nextcloud</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nextcloud fixes the following issues:

nextcloud was updated to 21.0.9:

- CVE-2021-41239 (CWE-200): user enumeration setting not obeyed in User Status API (boo#1196905)
- CVE-2021-41241 (CWE-863): groupfolders advanced permissions is not obeyed for subfolders (boo#1196908)
- CVE-2021-41741 (CWE-400): High memory usage for generating preview of broken image (boo#1196952)
- For more changes see https://nextcloud.com/changelog/#21-0-9
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2022-98</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZTHEQMMIKP2RX3EBMXDQAOIVUPMCDFB/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:0098-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196905</URL>
      <Description>SUSE Bug 1196905</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196908</URL>
      <Description>SUSE Bug 1196908</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1196952</URL>
      <Description>SUSE Bug 1196952</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41239/</URL>
      <Description>SUSE CVE CVE-2021-41239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41241/</URL>
      <Description>SUSE CVE CVE-2021-41241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-41741/</URL>
      <Description>SUSE CVE CVE-2021-41741 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 15 SP3">
      <Branch Type="Product Name" Name="SUSE Package Hub 15 SP3">
        <FullProductName ProductID="SUSE Package Hub 15 SP3">SUSE Package Hub 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-21.0.9-bp153.2.12.1">
      <FullProductName ProductID="nextcloud-21.0.9-bp153.2.12.1">nextcloud-21.0.9-bp153.2.12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nextcloud-apache-21.0.9-bp153.2.12.1">
      <FullProductName ProductID="nextcloud-apache-21.0.9-bp153.2.12.1">nextcloud-apache-21.0.9-bp153.2.12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nextcloud-21.0.9-bp153.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:nextcloud-21.0.9-bp153.2.12.1">nextcloud-21.0.9-bp153.2.12.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-apache-21.0.9-bp153.2.12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 15 SP3">
      <FullProductName ProductID="SUSE Package Hub 15 SP3:nextcloud-apache-21.0.9-bp153.2.12.1">nextcloud-apache-21.0.9-bp153.2.12.1 as a component of SUSE Package Hub 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-21.0.9-bp153.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:nextcloud-21.0.9-bp153.2.12.1">nextcloud-21.0.9-bp153.2.12.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="nextcloud-apache-21.0.9-bp153.2.12.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:nextcloud-apache-21.0.9-bp153.2.12.1">nextcloud-apache-21.0.9-bp153.2.12.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.</Note>
    </Notes>
    <CVE>CVE-2021-41239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZTHEQMMIKP2RX3EBMXDQAOIVUPMCDFB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41239.html</URL>
        <Description>CVE-2021-41239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196905</URL>
        <Description>SUSE Bug 1196905</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.</Note>
    </Notes>
    <CVE>CVE-2021-41241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZTHEQMMIKP2RX3EBMXDQAOIVUPMCDFB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41241.html</URL>
        <Description>CVE-2021-41241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1196908</URL>
        <Description>SUSE Bug 1196908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.</Note>
    </Notes>
    <CVE>CVE-2021-41741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>SUSE Package Hub 15 SP3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-21.0.9-bp153.2.12.1</ProductID>
        <ProductID>openSUSE Leap 15.3:nextcloud-apache-21.0.9-bp153.2.12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZTHEQMMIKP2RX3EBMXDQAOIVUPMCDFB/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-41741.html</URL>
        <Description>CVE-2021-41741</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
