FreeBSD Bugzilla – Attachment 255923 Details for
Bug 283389
www/gitea: update to 1.22.6 (fixes security vulnerabilities)
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
port+vuxrml entry
gitea-1.22.6.patch (text/plain), 9.51 KB, created by
Stefan Bethke
on 2024-12-17 18:30:28 UTC
(
hide
)
Description:
port+vuxrml entry
Filename:
MIME Type:
Creator:
Stefan Bethke
Created:
2024-12-17 18:30:28 UTC
Size:
9.51 KB
patch
obsolete
>diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml >index 8e9741134971..df792ef7fec6 100644 >--- a/security/vuxml/vuln/2024.xml >+++ b/security/vuxml/vuln/2024.xml >@@ -1,3 +1,196 @@ >+ <vuln vid="38e6f778-bca3-11ef-8926-9b4f2d14eb53"> >+ <topic>gitea -- Fix misuse of PublicKeyCallback</topic> >+ <affects> >+ <package> >+ <name>gitea</name> >+ <range><lt>1.22.6</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>Misuse of ServerConfig.PublicKeyCallback may cause authorization >+ bypass in golang.org/x/crypto</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://github.com/go-gitea/gitea/pull/32810</url> >+ <url>https://github.com/advisories/GHSA-v778-237x-gjrc</url> >+ </references> >+ <dates> >+ <discovery>2024-12-12</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="453cd84e-bca4-11ef-8926-9b4f2d14eb53"> >+ <topic>gitea -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>gitea</name> >+ <range><lt>1.22.5</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>Fix delete branch perm checking</li> >+ <li>Upgrade crypto library</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://github.com/go-gitea/gitea/pull/32791</url> >+ <url>https://github.com/go-gitea/gitea/pull/32654</url> >+ </references> >+ <dates> >+ <discovery>2024-11-27</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="6ea20f0c-bca3-11ef-8926-9b4f2d14eb53"> >+ <topic>gitea -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>gitea</name> >+ <range><lt>1.22.4</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>Fix basic auth with webauthn</li> >+ <li>Refactor internal routers (partial backport, auth token const time comparing)</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://github.com/go-gitea/gitea/pull/32531</url> >+ <url>https://github.com/go-gitea/gitea/pull/32473</url> >+ </references> >+ <dates> >+ <discovery>2024-11-16</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="5ca064a6-bca1-11ef-8926-9b4f2d14eb53"> >+ <topic>forgejo -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>forgejo</name> >+ <range><lt>9.0.2</lt></range> >+ <package> >+ <name>forgejo</name> >+ <range><lt>7.0.11</lt></range> >+ </package> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>It was possible to use a token sent via email for secondary email validation to reset the password instead. In other words, a token sent for a given action (registration, password reset or secondary email validation) could be used to perform a different action. It is no longer possible to use a token for an action that is different from its original purpose.</li> >+ <li>A fork of a public repository would show in the list of forks, even if its owner was not a public user or organization. Such a fork is now hidden from the list of forks of the public repository.</li> >+ <li>The members of an organization team with read access to a repository (e.g. to read issues) but no read access to the code could read the RSS or atom feeds which include the commit activity. Reading the RSS or atom feeds is now denied unless the team has read permissions on the code.</li> >+ <li>The tokens used when replying by email to issues or pull requests were weaker than the rfc2104 recommendations. The tokens are now truncated to 128 bits instead of 80 bits. It is no longer possible to reply to emails sent before the upgrade because the weaker tokens are invalid.</li> >+ <li>A registered user could modify the update frequency of any push mirror (e.g. every 4h instead of every 8h). They are now only able to do that if they have administrative permissions on the repository.</li> >+ <li>It was possible to use basic authorization (i.e. user:password) for requests to the API even when security keys were enrolled for a user. It is no longer possible, an application token must be used instead.</li> >+ <li>Some markup sanitation rules were not as strong as they could be (e.g. allowing emoji somethingelse as well as emoji). The rules are now stricter and do not allow for such cases.</li> >+ <li>When Forgejo is configured to enable instance wide search (e.g. with bleve), results found in the repositories of private or limited users were displayed to anonymous visitors. The results found in private or limited organizations were not displayed. The search results found in the repositories of private or limited user are no longer displayed to anonymous visitors.</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/5974</url> >+ </references> >+ <dates> >+ <discovery>2024-12-12</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="25a697de-bca1-11ef-8926-9b4f2d14eb53"> >+ <topic>forgejo -- unauthorized user impersonation</topic> >+ <affects> >+ <package> >+ <name>forgejo</name> >+ <range><lt>7.0.12</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>When Forgejo is configured to run the internal ssh server with >+ [server].START_SSH_SERVER=true, it was possible for a registered user >+ to impersonate another user. The rootless container image uses the >+ internal ssh server by default and was vulnerable. A Forgejo >+ instance running from a binary or from a root container image does >+ not use the internal ssh server by default and was not vulnerable. >+ The incorrect use of the crypto package is the root cause of the >+ vulnerability and was fixed for the internal ssh server.</li> >+ <li>Revert "allow synchronizing user status from OAuth2 login >+ providers"</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/6248</url> >+ </references> >+ <dates> >+ <discovery>2024-12-12</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ >+ <vuln vid="6dcf6fc6-bca0-11ef-8926-9b4f2d14eb53"> >+ <topic>forgejo -- multiple vulnerabilities</topic> >+ <affects> >+ <package> >+ <name>forgejo</name> >+ <range><lt>9.0.3</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <h1>Problem Description:</h1> >+ <ul> >+ <li>When Forgejo is configured to run the internal ssh server with >+ [server].START_SSH_SERVER=true, it was possible for a registered user >+ to impersonate another user. The rootless container image uses the >+ internal ssh server by default and was vulnerable. A Forgejo >+ instance running from a binary or from a root container image does >+ not use the internal ssh server by default and was not vulnerable. >+ The incorrect use of the crypto package is the root cause of the >+ vulnerability and was fixed for the internal ssh server.</li> >+ <li>Revert "allow synchronizing user status from OAuth2 login >+ providers"</li> >+ </ul> >+ </body> >+ </description> >+ <references> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/6248</url> >+ <url>https://codeberg.org/forgejo/forgejo/pulls/6249</url> >+ </references> >+ <dates> >+ <discovery>2024-12-12</discovery> >+ <entry>2024-12-17</entry> >+ </dates> >+ </vuln> >+ > <vuln vid="71f3e9f0-bafc-11ef-885d-901b0e934d69"> > <topic>py-matrix-synapse -- multiple vulnerabilities in versions prior to 1.120.1</topic> > <affects> >diff --git a/www/gitea/Makefile b/www/gitea/Makefile >index 2e1dd94a288b..5fd96d4aa778 100644 >--- a/www/gitea/Makefile >+++ b/www/gitea/Makefile >@@ -1,7 +1,6 @@ > PORTNAME= gitea > DISTVERSIONPREFIX= v >-DISTVERSION= 1.22.3 >-PORTREVISION= 2 >+DISTVERSION= 1.22.6 > CATEGORIES= www > MASTER_SITES= https://github.com/go-gitea/gitea/releases/download/${DISTVERSIONPREFIX}${DISTVERSION}/ \ > https://dl.gitea.io/gitea/${DISTVERSION}/ >diff --git a/www/gitea/distinfo b/www/gitea/distinfo >index 4058ff2276dc..9260354fa231 100644 >--- a/www/gitea/distinfo >+++ b/www/gitea/distinfo >@@ -1,3 +1,3 @@ >-TIMESTAMP = 1728456289 >-SHA256 (gitea-src-1.22.3.tar.gz) = 226291c16bc750c5d8953a7c16858ec5e8d87751308d25ffbbe75210f45215c2 >-SIZE (gitea-src-1.22.3.tar.gz) = 54325752 >+TIMESTAMP = 1734459279 >+SHA256 (gitea-src-1.22.6.tar.gz) = 251a3ee97e11f288764f9e15d0163116a04f2811b9d0d3c32f46a04f90f0756e >+SIZE (gitea-src-1.22.6.tar.gz) = 54465618
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 283389
: 255923