Bug 16106 - owncloud-client new security issue CVE-2015-4456
Summary: owncloud-client new security issue CVE-2015-4456
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/650303/
Whiteboard: MGA4TOO MGA4-64-OK MGA4-32-OK MGA5-64...
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-06-11 01:38 CEST by David Walser
Modified: 2015-07-06 20:25 CEST (History)
5 users (show)

See Also:
Source RPM: owncloud-client-1.8.1-4.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-06-11 01:38:18 CEST
Upstream has issued an advisory on June 8:
https://owncloud.org/security/advisory/?id=oc-sa-2015-009

The issue is fixed upstream in 1.8.2.

Mageia 4 and Mageia 5 are affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-06-11 01:38:24 CEST

Whiteboard: (none) => MGA5TOO, MGA4TOO

Comment 1 David Walser 2015-06-14 18:09:49 CEST
The 1.8.2 release has been pulled due to a regression on Windows:
https://mailman.owncloud.org/pipermail/devel/2015-June/001323.html

I asked about it on IRC in #owncloud-devel and #owncloud-security and was told:
<danimo> Luigi12: we shall be releasing owncloud client 1.8.3 on monday or tuesday. 1.8.2 had a regression. It's not mainly affecting linux, but I'd still recommend to wait

So we'll wait and hopefully be able to get this in soon.

CC: (none) => fri

Comment 2 Morgan Leijström 2015-06-14 18:24:55 CEST
Great, thanks :)
Comment 3 David Walser 2015-06-30 00:14:26 CEST
owncloud-client 1.8.3 has been released on June 23:
https://owncloud.org/changelog/desktop/

I can't build now in Mageia 5 because of the partial Qt5 update in updates_testing, nothing can be built against Qt5.  Saving the advisory for later.

If any sysadmins see this, please remove qtbase5 and associated RPMs from Mageia 5 core/updates_testing.  We can't push that until all of the Qt5 packages are committed and ready to build.

Advisory:
========================

Updated owncloud-client packages fix security vulnerability:

ownCloud Desktop Client before 1.8.2 was vulnerable against MITM attacks when
used in combination with self-signed certificates (CVE-2015-4456).

The owncloud-client package has been updated to version 1.8.3, which fixes this
issue as well as several other bugs.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4456
https://owncloud.org/security/advisory/?id=oc-sa-2015-009
https://owncloud.org/changelog/desktop/

CC: (none) => sysadmin-bugs
Version: Cauldron => 5
Whiteboard: MGA5TOO, MGA4TOO => MGA4TOO

Comment 4 David Walser 2015-07-03 23:29:09 CEST
Updated packages uploaded for Mageia 4 and Mageia 5.

Advisory:
========================

Updated owncloud-client packages fix security vulnerability:

ownCloud Desktop Client before 1.8.2 was vulnerable against MITM attacks when
used in combination with self-signed certificates (CVE-2015-4456).

The owncloud-client package has been updated to version 1.8.3, which fixes this
issue as well as several other bugs.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4456
https://owncloud.org/security/advisory/?id=oc-sa-2015-009
https://owncloud.org/changelog/desktop/
========================

Updated packages in core/updates_testing:
========================
owncloud-client-1.8.3-1.mga4
libowncloudsync1-1.8.3-1.mga4
libocsync1-1.8.3-1.mga4
libowncloud-client-devel-1.8.3-1.mga4
owncloud-client-1.8.3-1.mga5
libowncloudsync1-1.8.3-1.mga5
libocsync1-1.8.3-1.mga5
libowncloud-client-devel-1.8.3-1.mga5

from SRPMS:
owncloud-client-1.8.3-1.mga4
owncloud-client-1.8.3-1.mga5

CC: sysadmin-bugs => mageia
Assignee: mageia => qa-bugs

Comment 5 Morgan Leijström 2015-07-04 14:35:33 CEST
Test OK mga5 i586 & x86_64; upgrading existing installation of client 1.8.1
Package owncloud-client-1.8.3-1.mga5 from mga5 core testing.

owncloud-client now also pulls current libowncloudsync1 and libocsync1/lib64ocsync1 - great!

?: shouldnt the advisory also list the lib*64* packages?

The client on initial start rechecks all existing sync folders and behaves correctly, no output in terminal it started from.
Comment 6 Marc Lattemann 2015-07-04 15:22:34 CEST
tested on mga4 (32bit/64bit): don't know, how to test vulnerability, but installation, syncing with existing cloud works as expected. Adding mga4-OK tags and mga5-OK tags as well according to Comment 5

After upload of advisory update can be validated and pushed to core-updates.

CC: (none) => marc.lattemann
Whiteboard: MGA4TOO => MGA4TOO MGA4-64-OK MGA4-32-OK MGA5-64-OK MGA5-32-OK

Comment 7 Dave Hodgins 2015-07-04 19:02:46 CEST
Advisory committed to svn.

Someone from the sysadmin team please push 16106.adv to updates.

Keywords: (none) => validated_update
Whiteboard: MGA4TOO MGA4-64-OK MGA4-32-OK MGA5-64-OK MGA5-32-OK => MGA4TOO MGA4-64-OK MGA4-32-OK MGA5-64-OK MGA5-32-OK advisory
CC: (none) => davidwhodgins, sysadmin-bugs

Comment 8 Mageia Robot 2015-07-05 19:23:16 CEST
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2015-0256.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED

David Walser 2015-07-06 20:25:29 CEST

URL: (none) => http://lwn.net/Vulnerabilities/650303/


Note You need to log in before you can comment on or make changes to this bug.