Skip to content

Affected Versions / Ability to by-pass second factor CVE-2024-37313 #33

Closed Answered by markuman
juergen852 asked this question in Q&A
Discussion options

You must be logged in to vote

Did you know about CVE-2024-37313 already for such a long time ago,

I'm not a nextcloud developer, but IMHO, yes. Critical CVE are always kept some time and published after some releases. So on publish date, most nextcloud servers who update frequently are already patched.
That's the way most software-release-cve-workflow works like.

that it was fixed when 29.0.0 was released months ago?

Thank good, it's open source and not microsoft here.
The fix was merged on 20th march: nextcloud/server#44276 and the 29.0.0 release was one mnoth later: https://github.com/nextcloud/server/releases/tag/v29.0.0
So yes, 29.0.0 was never affected.

Replies: 1 comment 1 reply

Comment options

You must be logged in to vote
1 reply
@markuman
Comment options

Answer selected by nickvergessen
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants