| Summary: | owncloud new security issues fixed upstream in 8.0.9 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/663795/ | ||
| Whiteboard: | has_procedure advisory mga5-64-ok | ||
| Source RPM: | owncloud-8.0.8-1.mga5.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-11-04 12:25:02 CET
Testing complete mga5 64 Database upgrades successfully, uploads work ok and syncs OK with the client. Whiteboard:
has_procedure =>
has_procedure mga5-64-ok Validating. Keywords:
(none) =>
validated_update Advisory uploaded. Whiteboard:
has_procedure mga5-64-ok =>
has_procedure advisory mga5-64-ok An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0437.html Status:
NEW =>
RESOLVED
David Walser
2015-11-09 20:32:32 CET
URL:
(none) =>
http://lwn.net/Vulnerabilities/663795/ CVE-2016-1501 was the security issue fixed here: https://owncloud.org/security/advisory/?id=oc-sa-2016-004 Advisory: ======================== Updated owncloud package fixes security vulnerability: ownCloud returns exception error messages to the user in two different places, allowing an authenticated adversary to gain information about the installation path of the ownCloud instance. There is no further information disclosure (CVE-2016-1501). References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1501 https://owncloud.org/security/advisory/?id=oc-sa-2016-004 https://owncloud.org/changelog/ |