-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2025-3dff292265 2025-01-29 05:23:04.063048+00:00 -------------------------------------------------------------------------------- Name : vaultwarden Product : Fedora 40 Version : 1.32.7 Release : 4.fc40 URL : https://github.com/dani-garcia/vaultwarden Summary : Unofficial Bitwarden compatible server Description : Unofficial Bitwarden compatible server. -------------------------------------------------------------------------------- Update Information: fix VW_VERSION in compiled code, patch security issues -------------------------------------------------------------------------------- ChangeLog: * Tue Jan 21 2025 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.32.7-4 - Set VW_VERSION env var during build and install rhbz#2338534 * Sun Jan 19 2025 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 1.32.7-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild * Wed Jan 15 2025 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.32.7-2 - fix build on el9 with rust 1.79 * Fri Jan 3 2025 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.32.7-1 - update to 1.32.7 rhbz#2322181 - Fix CVE-2024-56335 * Tue Oct 22 2024 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.32.2-1 - update to 1.32.2 rhbz#2316657 * Sun Aug 11 2024 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.32.0-1 - update to 1.32.0 rhbz#2304045 Resolves CVE-2024-39924 Resolves CVE-2024-39925 Resolves CVE-2024-39926 * Fri Aug 2 2024 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.31.0-2 - Exclude s390x and ppc64le * Fri Jul 19 2024 Jonathan Wright <jonathan@xxxxxxxxxxxxx> - 1.31.0-1 - update to 1.31.0 rhbz#2297149 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2307705 - vaultwarden: FTBFS in Fedora 40 and 39 https://bugzilla.redhat.com/show_bug.cgi?id=2307705 [ 2 ] Bug #2333595 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2333595 [ 3 ] Bug #2333596 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2333596 [ 4 ] Bug #2333597 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2333597 [ 5 ] Bug #2336825 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2336825 [ 6 ] Bug #2336826 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2336826 [ 7 ] Bug #2336827 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2336827 [ 8 ] Bug #2336829 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2336829 [ 9 ] Bug #2336830 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2336830 [ 10 ] Bug #2336831 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2336831 [ 11 ] Bug #2336833 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2336833 [ 12 ] Bug #2336834 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2336834 [ 13 ] Bug #2336835 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2336835 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2025-3dff292265' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue