UBUNTU-CVE-2023-29000

Source
https://ubuntu.com/security/CVE-2023-29000
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-29000.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-29000
Related
Published
2023-04-04T13:15:00Z
Modified
2025-01-13T10:24:19Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available.

References

Affected packages

Ubuntu:20.04:LTS / nextcloud-desktop

Package

Name
nextcloud-desktop
Purl
pkg:deb/ubuntu/nextcloud-desktop@2.6.2-1build1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.5.3-1
2.6.0-1
2.6.1-1
2.6.1-2
2.6.2-1
2.6.2-1build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / nextcloud-desktop

Package

Name
nextcloud-desktop
Purl
pkg:deb/ubuntu/nextcloud-desktop@3.4.2-1ubuntu1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.2.3-0ubuntu1
3.3.5-1
3.3.5-1ubuntu1
3.4.2-1
3.4.2-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}