Name | CVE-2023-29000 |
Description | The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
nextcloud-desktop (PTS) | bullseye | 3.1.1-2+deb11u1 | vulnerable |
| bullseye (security) | 3.1.1-2+deb11u2 | vulnerable |
| bookworm | 3.7.3-1+deb12u2 | fixed |
| trixie | 3.16.4-1 | fixed |
| forky, sid | 3.16.7-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
nextcloud-desktop | source | (unstable) | 3.7.0-1 | | | |
Notes
[bullseye] - nextcloud-desktop <ignored> (Minor issue, too intrusive to backport)
[buster] - nextcloud-desktop <no-dsa> (Minor issue)
https://github.com/nextcloud/desktop/pull/4949
https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534
https://hackerone.com/reports/1679267