ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
{
"binaries": [
{
"binary_name": "libowncloudsync-dev",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "libowncloudsync0",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "libowncloudsync0-dbgsym",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "nautilus-owncloud",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client-cmd",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client-cmd-dbgsym",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client-dbgsym",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client-doc",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
},
{
"binary_name": "owncloud-client-l10n",
"binary_version": "2.1.1+dfsg-1ubuntu1.1"
}
],
"availability": "No subscription required"
}