git: 43e383b8b4bd - main - security/vuxml: add record for www/forgejo < 9.0.1 and www/forgejo7 < 7.0.10
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Tue, 29 Oct 2024 15:27:05 UTC
The branch main has been updated by vvd: URL: https://cgit.FreeBSD.org/ports/commit/?id=43e383b8b4bd5d8325a83ac4daa1617b8fcae4e0 commit 43e383b8b4bd5d8325a83ac4daa1617b8fcae4e0 Author: Stefan Bethke <stb@lassitu.de> AuthorDate: 2024-10-29 15:24:02 +0000 Commit: Vladimir Druzenko <vvd@FreeBSD.org> CommitDate: 2024-10-29 15:24:02 +0000 security/vuxml: add record for www/forgejo < 9.0.1 and www/forgejo7 < 7.0.10 https://codeberg.org/forgejo/forgejo/milestone/8544 https://codeberg.org/forgejo/forgejo/pulls/5719 https://codeberg.org/forgejo/forgejo/pulls/5718 PR: 282387 --- security/vuxml/vuln/2024.xml | 44 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 44 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 8843fc4150ea..9b5facf921c7 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,47 @@ + <vuln vid="f07c8f87-8e65-11ef-81b8-659bf0027d16"> + <topic>forgejo -- multiple vulnerabilities</topic> + <affects> + <package> + <name>forgejo</name> + <range><lt>9.0.1</lt></range> + </package> + <package> + <name>forgejo7</name> + <range><lt>7.0.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <h1>Problem Description:</h1> + <ul> + <li>Forgejo generates a token which is used to authenticate web + endpoints that are only meant to be used internally, for instance + when the SSH daemon is used to push a commit with Git. The + verification of this token was not done in constant time and was + susceptible to timing attacks. A pre-condition for such an attack is + the precise measurements of the time for each operation. Since it + requires observing the timing of network operations, the issue is + mitigated when a Forgejo instance is accessed over the internet + because the ISP introduce unpredictable random delays.</li> + <li>Because of a missing permission check, the branch used to propose + a pull request to a repository can always be deleted by the user + performing the merge. It was fixed so that such a deletion is only + allowed if the user performing the merge has write permission to the + repository from which the pull request was made.</li> + </ul> + </body> + </description> + <references> + <url>https://codeberg.org/forgejo/forgejo/milestone/8544</url> + <url>https://codeberg.org/forgejo/forgejo/pulls/5719</url> + <url>https://codeberg.org/forgejo/forgejo/pulls/5718</url> + </references> + <dates> + <discovery>2024-10-28</discovery> + <entry>2024-10-28</entry> + </dates> + </vuln> + <vuln vid="fafaef4d-f364-4a07-bbdd-bf53448c593c"> <topic>chromium -- multiple security fixes</topic> <affects>