--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2025-3dff292265
2025-01-29 05:23:04.063048+00:00
--------------------------------------------------------------------------------

Name        : vaultwarden
Product     : Fedora 40
Version     : 1.32.7
Release     : 4.fc40
URL         : https://github.com/dani-garcia/vaultwarden
Summary     : Unofficial Bitwarden compatible server
Description :
Unofficial Bitwarden compatible server.

--------------------------------------------------------------------------------
Update Information:

fix VW_VERSION in compiled code, patch security issues
--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 21 2025 Jonathan Wright  - 1.32.7-4
- Set VW_VERSION env var during build and install rhbz#2338534
* Sun Jan 19 2025 Fedora Release Engineering  - 1.32.7-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild
* Wed Jan 15 2025 Jonathan Wright  - 1.32.7-2
- fix build on el9 with rust 1.79
* Fri Jan  3 2025 Jonathan Wright  - 1.32.7-1
- update to 1.32.7 rhbz#2322181
- Fix CVE-2024-56335
* Tue Oct 22 2024 Jonathan Wright  - 1.32.2-1
- update to 1.32.2 rhbz#2316657
* Sun Aug 11 2024 Jonathan Wright  - 1.32.0-1
- update to 1.32.0 rhbz#2304045
  Resolves CVE-2024-39924
  Resolves CVE-2024-39925
  Resolves CVE-2024-39926
* Fri Aug  2 2024 Jonathan Wright  - 1.31.0-2
- Exclude s390x and ppc64le
* Fri Jul 19 2024 Jonathan Wright  - 1.31.0-1
- update to 1.31.0 rhbz#2297149
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2307705 - vaultwarden: FTBFS in Fedora 40 and 39
        https://bugzilla.redhat.com/show_bug.cgi?id=2307705
  [ 2 ] Bug #2333595 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2333595
  [ 3 ] Bug #2333596 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2333596
  [ 4 ] Bug #2333597 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2333597
  [ 5 ] Bug #2336825 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336825
  [ 6 ] Bug #2336826 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336826
  [ 7 ] Bug #2336827 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336827
  [ 8 ] Bug #2336829 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336829
  [ 9 ] Bug #2336830 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336830
  [ 10 ] Bug #2336831 - CVE-2024-55225 vaultwarden: user spoofing via crafted authorization request [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336831
  [ 11 ] Bug #2336833 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [epel-9]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336833
  [ 12 ] Bug #2336834 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [fedora-40]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336834
  [ 13 ] Bug #2336835 - CVE-2024-55224 vaultwarden: arbitrary code execution via injecting a crafted payload into the username field of an e-mail message [fedora-41]
        https://bugzilla.redhat.com/show_bug.cgi?id=2336835
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2025-3dff292265' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Fedora 40: vaultwarden 2025-3dff292265 Security Advisory Updates

January 29, 2025
fix VW_VERSION in compiled code, patch security issues

Summary

Unofficial Bitwarden compatible server.

Update Information:

fix VW_VERSION in compiled code, patch security issues

Change Log

* Tue Jan 21 2025 Jonathan Wright - 1.32.7-4 - Set VW_VERSION env var during build and install rhbz#2338534 * Sun Jan 19 2025 Fedora Release Engineering - 1.32.7-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_42_Mass_Rebuild * Wed Jan 15 2025 Jonathan Wright - 1.32.7-2 - fix build on el9 with rust 1.79 * Fri Jan 3 2025 Jonathan Wright - 1.32.7-1 - update to 1.32.7 rhbz#2322181 - Fix CVE-2024-56335 * Tue Oct 22 2024 Jonathan Wright - 1.32.2-1 - update to 1.32.2 rhbz#2316657 * Sun Aug 11 2024 Jonathan Wright - 1.32.0-1 - update to 1.32.0 rhbz#2304045 Resolves CVE-2024-39924 Resolves CVE-2024-39925 Resolves CVE-2024-39926 * Fri Aug 2 2024 Jonathan Wright - 1.31.0-2 - Exclude s390x and ppc64le * Fri Jul 19 2024 Jonathan Wright - 1.31.0-1 - update to 1.31.0 rhbz#2297149

References

[ 1 ] Bug #2307705 - vaultwarden: FTBFS in Fedora 40 and 39 https://bugzilla.redhat.com/show_bug.cgi?id=2307705 [ 2 ] Bug #2333595 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2333595 [ 3 ] Bug #2333596 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2333596 [ 4 ] Bug #2333597 - CVE-2024-56335 vaultwarden: Privilege escalation allows organization groups to be updated/deleted if their UUID is known in vaultwarden [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2333597 [ 5 ] Bug #2336825 - CVE-2024-55226 vaultwarden: uthenticated reflected XSS vulnerability [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2336825 [ 6 ] Bug #2...

Read the Full Advisory

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2025-3dff292265' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : vaultwarden
Product : Fedora 40
Version : 1.32.7
Release : 4.fc40
URL : https://github.com/dani-garcia/vaultwarden
Summary : Unofficial Bitwarden compatible server

Related News