MGASA-2021-0421

Source
https://advisories.mageia.org/MGASA-2021-0421.html
Import Source
https://advisories.mageia.org/MGASA-2021-0421.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2021-0421
Related
Published
2021-09-23T04:49:29Z
Modified
2021-09-23T03:58:17Z
Summary
Updated nextcloud-client packages fix security vulnerability
Details

Nextcloud Desktop Client before 3.3.1 is vulnerable to improper certificate validation due to lack of SSL certificate verification when using the "Register with a Provider" flow. (CVE-2021-22895)

In versions prior to 3.3.0, the Nextcloud Desktop client fails to check if a private key belongs to previously downloaded public certificate. If the Nextcloud instance serves a malicious public key, the data would be encrypted for this key and thus could be accessible to a malicious actor. This issue is fixed in Nextcloud Desktop Client version 3.3.0

References
Credits

Affected packages

Mageia:8 / nextcloud-client

Package

Name
nextcloud-client
Purl
pkg:rpm/mageia/nextcloud-client?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.3-1.mga8

Ecosystem specific

{
    "section": "core"
}