ALT-BU-2023-3867-1
Branch sisyphus update bulletin.
Closed bugs
Обновление версии с 2.7 до 2.9
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-26928
BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees
Package nextcloud-client updated to version 3.8.2-alt1 for branch sisyphus in task 322642.
Closed vulnerabilities
BDU:2021-04668
Уязвимость клиента инструмента синхронизации папок для рабочего стола Nextcloud, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-01788
Уязвимость функционала сквозного шифрования клиента инструмента синхронизации папок для рабочего стола Nextcloud, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2021-22879
Nextcloud Desktop Client prior to 3.1.3 is vulnerable to resource injection by way of missing validation of URLs, allowing a malicious server to execute remote commands. User interaction is needed for exploitation.
- https://github.com/nextcloud/desktop/pull/2906
- https://github.com/nextcloud/desktop/pull/2906
- https://hackerone.com/reports/1078002
- https://hackerone.com/reports/1078002
- FEDORA-2021-1ffffa0251
- FEDORA-2021-1ffffa0251
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-008
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-008
- GLSA-202105-37
- GLSA-202105-37
Modified: 2024-11-21
CVE-2021-22895
Nextcloud Desktop Client before 3.3.1 is vulnerable to improper certificate validation due to lack of SSL certificate verification when using the "Register with a Provider" flow.
- https://github.com/nextcloud/desktop/pull/2926
- https://github.com/nextcloud/desktop/pull/2926
- https://github.com/nextcloud/desktop/releases/tag/v3.1.3
- https://github.com/nextcloud/desktop/releases/tag/v3.1.3
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpgp-vf4p-wcw5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-qpgp-vf4p-wcw5
- https://hackerone.com/reports/903424
- https://hackerone.com/reports/903424
- DSA-4974
- DSA-4974
Modified: 2024-11-21
CVE-2021-32728
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with a computer. Clients using the Nextcloud end-to-end encryption feature download the public and private key via an API endpoint. In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0. There are no known workarounds aside from upgrading.
- https://github.com/nextcloud/desktop/pull/3338
- https://github.com/nextcloud/desktop/pull/3338
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f5fr-5gcv-6cc5
- https://hackerone.com/reports/1189162
- https://hackerone.com/reports/1189162
- DSA-4974
- DSA-4974
Modified: 2024-11-21
CVE-2022-39331
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
- https://github.com/nextcloud/desktop/pull/4944
- https://github.com/nextcloud/desktop/pull/4944
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3xh-q694-6rc5
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3xh-q694-6rc5
- https://hackerone.com/reports/1668028
- https://hackerone.com/reports/1668028
Modified: 2024-11-21
CVE-2022-39332
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
- https://github.com/nextcloud/desktop/pull/4972
- https://github.com/nextcloud/desktop/pull/4972
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p
- https://hackerone.com/reports/1707977
- https://hackerone.com/reports/1707977
Modified: 2024-11-21
CVE-2022-39333
Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.
- https://github.com/nextcloud/desktop/pull/4972
- https://github.com/nextcloud/desktop/pull/4972
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92p9-x79h-2mj8
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92p9-x79h-2mj8
- https://hackerone.com/reports/1711847
- https://hackerone.com/reports/1711847
Modified: 2024-11-21
CVE-2022-39334
Nextcloud also ships a CLI utility called nextcloudcmd which is sometimes used for automated scripting and headless servers. Versions of nextcloudcmd prior to 3.6.1 would incorrectly trust invalid TLS certificates, which may enable a Man-in-the-middle attack that exposes sensitive data or credentials to a network attacker. This affects the CLI only. It does not affect the standard GUI desktop Nextcloud clients, and it does not affect the Nextcloud server.
- https://github.com/nextcloud/desktop/issues/4927
- https://github.com/nextcloud/desktop/issues/4927
- https://github.com/nextcloud/desktop/pull/5022
- https://github.com/nextcloud/desktop/pull/5022
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv
- https://hackerone.com/reports/1699740
- https://hackerone.com/reports/1699740
Modified: 2024-11-21
CVE-2023-23942
The Nextcloud Desktop Client is a tool to synchronize files from a Nextcloud Server with your computer. Versions prior to 3.6.3 are missing sanitisation on qml labels which are used for basic HTML elements such as `strong`, `em` and `head` lines in the UI of the desktop client. The lack of sanitisation may allow for javascript injection. It is recommended that the Nextcloud Desktop Client is upgraded to 3.6.3. There are no known workarounds for this issue.
- https://github.com/nextcloud/desktop/pull/5233
- https://github.com/nextcloud/desktop/pull/5233
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-64qc-vf6v-8xgg
- https://hackerone.com/reports/1788598
- https://hackerone.com/reports/1788598
Modified: 2024-11-21
CVE-2023-28997
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can recover and modify the contents of end-to-end encrypted files. Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/desktop/pull/5324
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4p33-rw27-j5fc
- https://github.com/nextcloud/desktop/pull/5324
Modified: 2024-11-21
CVE-2023-28998
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.6.5, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure, and add new files.? Users should upgrade the Nextcloud Desktop client to 3.6.5 to receive a patch. No known workarounds are available.
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/desktop/pull/5323
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jh3g-wpwv-cqgr
- https://github.com/nextcloud/desktop/pull/5323
Modified: 2024-11-21
CVE-2023-28999
Nextcloud is an open-source productivity platform. In Nextcloud Desktop client 3.0.0 until 3.8.0, Nextcloud Android app 3.13.0 until 3.25.0, and Nextcloud iOS app 3.0.5 until 4.8.0, a malicious server administrator can gain full access to an end-to-end encrypted folder. They can decrypt files, recover the folder structure and add new files.? This issue is fixed in Nextcloud Desktop 3.8.0, Nextcloud Android 3.25.0, and Nextcloud iOS 4.8.0. No known workarounds are available.
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/desktop/pull/5560
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8
- https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_DanieleCoppola.pdf
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8875-wxww-3rr8
- https://github.com/nextcloud/desktop/pull/5560
Modified: 2024-11-21
CVE-2023-29000
The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server. Starting with version 3.0.0 and prior to version 3.7.0, by trusting that the server will return a certificate that belongs to the keypair of the user, a malicious server could get the desktop client to encrypt files with a key known to the attacker. This issue is fixed in Nextcloud Desktop 3.7.0. No known workarounds are available.
- https://github.com/nextcloud/desktop/pull/4949
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534
- https://hackerone.com/reports/1679267
- https://github.com/nextcloud/desktop/pull/4949
- https://hackerone.com/reports/1679267
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-h82x-98q3-7534
Closed bugs
Новый стим не отображает окно добавления нового хранилища.
Package nextcloud-client updated to version 3.9.0-alt1 for branch sisyphus in task 323300.
Closed bugs
Не появляется "Главный диалог" nextcloud-client
Package python3-module-loguru updated to version 0.7.0-alt2 for branch sisyphus in task 323326.
Closed bugs
Собирать для ppc64le
Closed bugs
не работает обзор файлов снимков
Package xdg-desktop-portal-xapp updated to version 1.0.1-alt2 for branch sisyphus in task 323306.
Closed bugs
При использовании альтернативных оконных менеджеров запуск GTK-приложений занимает порядка 30 секунд