CVSROOT:        /cvs
Module name:    ports
Changes by:     [email protected]  2025/01/27 06:59:47

Modified files:
        security/vaultwarden: Tag: OPENBSD_7_6 Makefile crates.inc 
                              distinfo 
        security/vaultwarden/patches: Tag: OPENBSD_7_6 patch-Cargo_toml 
Added files:
        security/vaultwarden/patches: Tag: OPENBSD_7_6 
                                      patch-src_api_notifications_rs 
                                      patch-src_crypto_rs 
                                      patch-src_db_models_cipher_rs 

Log message:
security/vaultwarden: update to 1.33.0

contains 3 security fixes:
- GHSA-f7r5-w49x-gxm3: This vulnerability is only possible if you do not
have an ADMIN_TOKEN configured and open links or pages you should not
trust anyway. Ensure you have an ADMIN_TOKEN configured to keep your
admin environment save.
- GHSA-h6cc-rc6q-23j4: This vulnerability is only possible if someone
was able to gain access to your Vaultwarden Admin Backend. The
attacker could then change some settings to use sendmail as mail agent
but adjust the settings in such a way that it would use a shell
command.  It then also needed to craft a special favicon image which
would have the commands embedded to run during for example sending a
test email.
- GHSA-j4h8-vch3-f797: This vulnerability affects all users who have
multiple Organizations and users which are able to create a new
organization or have admin or owner rights on at least one
organization. The attacker does need to know the Organization UUID of
the Organization it want's to attack or compromise though.

Full changelog:
https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0.

OK: bket@ aisha@

Reply via email to