Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 883685 (CVE-2022-39331, CVE-2022-39332, CVE-2022-39333, CVE-2022-39334)

Summary: <net-misc/nextcloud-client-3.6.1: multiple vulnerabilities
Product: Gentoo Security Reporter: John Helmert III <ajak>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: flow, voyageur
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard: B4 [noglsa]
Package list:
Runtime testing required: ---

Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-11-30 00:22:05 UTC
CVE-2022-39331 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-c3xh-q694-6rc5):

Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application in the notifications. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.

CVE-2022-39332 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-q9f6-4r6r-h74p):

Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application via user status and information. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.

CVE-2022-39333 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-92p9-x79h-2mj8):

Nexcloud desktop is the Desktop sync client for Nextcloud. An attacker can inject arbitrary HyperText Markup Language into the Desktop Client application. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this issue.

CVE-2022-39334 (https://github.com/nextcloud/security-advisories/security/advisories/GHSA-82xx-98xv-4jxv):

Nextcloud desktop is the desktop sync client for Nextcloud. Versions prior to 3.6.1 would incorrectly trust invalid TLS certificates. A Man-in-the-middle attack is possible in case a user can be made running a nextcloudcmd CLI command locally. It is recommended that the Nextcloud Desktop client is upgraded to 3.6.1. There are no known workarounds for this vulnerability.

Please stabilize 3.6.1 or newer.
Comment 1 Larry the Git Cow gentoo-dev 2022-12-02 08:01:13 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=5a39b1d2b5b3e7f1fa5cc678d16b6353eb354b21

commit 5a39b1d2b5b3e7f1fa5cc678d16b6353eb354b21
Author:     Bernard Cafarelli <voyageur@gentoo.org>
AuthorDate: 2022-12-02 08:01:00 +0000
Commit:     Bernard Cafarelli <voyageur@gentoo.org>
CommitDate: 2022-12-02 08:01:11 +0000

    net-misc/nextcloud-client: drop 3.5.4
    
    Bug: https://bugs.gentoo.org/883685
    Signed-off-by: Bernard Cafarelli <voyageur@gentoo.org>

 net-misc/nextcloud-client/Manifest                 |   1 -
 .../nextcloud-client/nextcloud-client-3.5.4.ebuild | 105 ---------------------
 2 files changed, 106 deletions(-)
Comment 2 Bernard Cafarelli gentoo-dev 2022-12-02 08:01:37 UTC
3.6.1 is current stable, dropped previous version
Comment 3 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-12-02 17:37:21 UTC
Thanks! HTML injections are very low impact, no GLSA. All done!