UBUNTU-CVE-2021-32728

Source
https://ubuntu.com/security/CVE-2021-32728
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-32728.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2021-32728
Related
Published
2021-08-18T16:15:00Z
Modified
2024-10-15T14:08:09Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.

References

Affected packages

Ubuntu:20.04:LTS / nextcloud-desktop

Package

Name
nextcloud-desktop
Purl
pkg:deb/ubuntu/nextcloud-desktop?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.5.3-1
2.6.0-1
2.6.1-1
2.6.1-2
2.6.2-1
2.6.2-1build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / nextcloud-desktop

Package

Name
nextcloud-desktop
Purl
pkg:deb/ubuntu/nextcloud-desktop?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.2.3-0ubuntu1
3.3.5-1
3.3.5-1ubuntu1
3.4.2-1
3.4.2-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}