Affected Versions / Ability to by-pass second factor CVE-2024-37313 #33
-
The problem was filed 3 days ago.
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
I'm not a nextcloud developer, but IMHO, yes. Critical CVE are always kept some time and published after some releases. So on publish date, most nextcloud servers who update frequently are already patched.
Thank good, it's open source and not microsoft here. |
Beta Was this translation helpful? Give feedback.
I'm not a nextcloud developer, but IMHO, yes. Critical CVE are always kept some time and published after some releases. So on publish date, most nextcloud servers who update frequently are already patched.
That's the way most software-release-cve-workflow works like.
Thank good, it's open source and not microsoft here.
The fix was merged on 20th march: nextcloud/server#44276 and the 29.0.0 release was one mnoth later: https://github.com/nextcloud/server/releases/tag/v29.0.0
So yes, 29.0.0 was never affected.