Upstream has released new versions on September 15: https://owncloud.org/blog/8-1-3-8-0-8-and-7-0-10-updates-ready-owncloud-appliance-with-owncloud-proxy-out/ I'm not sure if there are more security fixes in 8.0.8 vs. 8.0.6, as upstream waits forever to announce them, but 8.0.6 fixed two security issues vs. the 8.0.5 that we currently have: https://owncloud.org/security/advisory/?id=oc-sa-2015-014 https://owncloud.org/security/advisory/?id=oc-sa-2015-015 The upstream changelog, of course, doesn't mention these anyway: https://owncloud.org/changelog/ Updated packages uploaded for Mageia 5 and Cauldron. Advisory to come later. owncloud-8.0.8-1.mga5 from owncloud-8.0.8-1.mga5.src.rpm Reproducible: Steps to Reproduce:
You can find testing information in Bug 16491.
Whiteboard: (none) => has_procedure
mga5-32 Installed as an update to 8.05. Update and upgrade worked successfully. Functioning as designed. Also, it retained settings in config file. Hurray!!!!
CC: (none) => brtians1Whiteboard: has_procedure => has_procedure MGA5-32-OK
mga5-32 Installed a freshcopy of 8.08(In reply to Brian Rockwell from comment #2) > mga5-32 > > Installed as an update to 8.05. Update and upgrade worked successfully. > Functioning as designed. Also, it retained settings in config file. > Hurray!!!! that was an upgrade from 8.05 to 8.08. All worked fine
mga5-64 Installed a freshcopy to 64-bit machine using sql-lite instead of MariaDB. All worked fine. I'm able to attach to it and use it. approved to move forward.
Whiteboard: has_procedure MGA5-32-OK => has_procedure MGA5-32-OK MGA5-64-OK
Well done Brian, thanks. Don't forget to validate the update when it's tested.
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugs
Advisory: ======================== Updated owncloud package fixes security vulnerabilities: In ownCloud before 8.0.6, due to an incorrect usage of an ownCloud internal file system function the passed path to the file scanner was resolved relatively. An authenticated adversary may thus be able to get a listing of directories (but not the containing files) existing on the filesystem. However, it is not possible to access any of these files (CVE-2015-6500). In ownCloud before 8.0.6, due to not properly checking the ownership of an calendar, an authenticated attacker is able to download calendars of other users via the âcalidâ GET parameter to export.php in /apps/calendar/ (CVE-2015-6670). The owncloud package has been updated to version 8.0.8, which fixes these issues, as well as other bugs and other not-yet-disclosed security issues. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6500 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6670 https://owncloud.org/security/advisory/?id=oc-sa-2015-014 https://owncloud.org/security/advisory/?id=oc-sa-2015-015 https://owncloud.org/changelog/
Advisory uploaded.
Whiteboard: has_procedure MGA5-32-OK MGA5-64-OK => has_procedure advisory MGA5-32-OK MGA5-64-OK
An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGASA-2015-0378.html
Status: NEW => RESOLVEDResolution: (none) => FIXED
URL: (none) => http://lwn.net/Vulnerabilities/657997/
This update also fixed CVE-2015-7699: https://owncloud.org/security/advisory/?id=oc-sa-2015-018 LWN reference with that CVE and some older ones (from a Debian advisory): http://lwn.net/Vulnerabilities/661347/