openSUSE Security Update: Security update for nextcloud

Announcement ID:    openSUSE-SU-2022:0098-1
Rating:             moderate
References:         #1196905 #1196908 #1196952 
Cross-References:   CVE-2021-41239 CVE-2021-41241 CVE-2021-41741
CVSS scores:
                    CVE-2021-41239 (NVD) : 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-41239 (SUSE): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-41241 (NVD) : 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
                    CVE-2021-41241 (SUSE): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Affected Products:
                    openSUSE Backports SLE-15-SP3

   An update that fixes three vulnerabilities is now available.


   This update for nextcloud fixes the following issues:

   nextcloud was updated to 21.0.9:

   - CVE-2021-41239 (CWE-200): user enumeration setting not obeyed in User
     Status API (boo#1196905)
   - CVE-2021-41241 (CWE-863): groupfolders advanced permissions is not
     obeyed for subfolders (boo#1196908)
   - CVE-2021-41741 (CWE-400): High memory usage for generating preview of
     broken image (boo#1196952)
   - For more changes see

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Backports SLE-15-SP3:

      zypper in -t patch openSUSE-2022-98=1

Package List:

   - openSUSE Backports SLE-15-SP3 (noarch):