From nobody Mon Jun 17 17:34:27 2024 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4W2xpC3YC0z5PHg2; Mon, 17 Jun 2024 17:34:27 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4W2xpC2xvxz4502; Mon, 17 Jun 2024 17:34:27 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718645667; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Emveflo059MOvU+HJMVkQBwaOpIhMf+tzgsQ5AC1xbg=; b=KYd1coKs41TS7OwfPdB3RDDLP0+sfRCEhIJs1/OLfYg7oysKleyzAgydXhhI6dUWdhgzj9 P4SiruPYb9f8ff4kVgwaPMmNlZcKpqyjIV5BgXJ2NTDNAu/Pr0mZusIjlU2vYRJdr6TCbD yzfHLukDtAfIjkNSd1D8nCPUJ50pMWlVaCvfXNrKAbHQmqp2Dqe1G0mC7qVIIO3qJHAxuo dE+4VwS/r75kz4Adtll2Ee/Ttob9QmUDXuMsU5AsSTUC9dXIz+xVXw+ox1YFU29Bq0hnS0 piBsipyczUOD2hLCZ1uv7iiRH67qKyh+xckeyYgsPdsn0MWWfINtFbiHTuHNoQ== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1718645667; a=rsa-sha256; cv=none; b=avuuMxX05hvc3Efp00vf03Foe1MD3OQL6Z1GMzbgNjuyh/mdYSviNCF7MzQ6Ny58HRMsJH Rfd2KS7QYAt/i5JBjDX1uqc++Lf4Qnq+D02sg0022CcAVST3oBRWSQROKKRVY352t2bcvt aa/bCUxmUHdNfE8yJfGrvDM8d2hUhVJ9mL6sOYIwV4JcJlwKOhZe/PIGdcRmYvmTZgKs3h PHNgDJg9S0lwcB4un55d8v3T8UdYEu8B9/0bGjtWfBtveI14h4vYJ4JgRPORxMathC5qaG MBhC3UuMs7DJuPTOCf02DMbDeSl33Np/oWyIKbuH5UroquDwR+RwzgYlv3tf6Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1718645667; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=Emveflo059MOvU+HJMVkQBwaOpIhMf+tzgsQ5AC1xbg=; b=r/A5EDbFDcrxqs37yHJPRAS5W8usA3Y9HeAVO5/aFm94n3nJB1opCZOBfFqlvi+OSoLtVI D+59Cpc6A9xfDhf1y23+ImYZ4AKJnQBuszeEnqlIHqv1fUt+gNk5Hu5SDuiU0XEuMQ0V+Q XD4xSOjXN2Nd1jUXl/b85/34ph6hp4oLeTy1zisbrw92TyBQF42V4/UeSXoz7CBaiymsIr exmKSAC82kGMkRDoQZOkDHp/Wb8/Ol59X2yzqjFGDtYdHhnpyxCWmMFO4iefVzOx9KvQ+J I7jFvleA8ibSAxi4APV3tzxJ7KANh+CM5FFq4q7rpG+PfLqIWdTl7ygbFUdmGw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4W2xpC2RYvzP5W; Mon, 17 Jun 2024 17:34:27 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 45HHYRqP007355; Mon, 17 Jun 2024 17:34:27 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 45HHYRJt007352; Mon, 17 Jun 2024 17:34:27 GMT (envelope-from git) Date: Mon, 17 Jun 2024 17:34:27 GMT Message-Id: <202406171734.45HHYRJt007352@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Fernando =?utf-8?Q?Apestegu=C3=ADa?= Subject: git: 46213c50d8ac - main - security/vuxml: Add www/forgejo vulnerability List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-all@freebsd.org Sender: owner-dev-commits-ports-all@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: fernape X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 46213c50d8ac9a2b3dc090e470ee0dde70127b48 Auto-Submitted: auto-generated The branch main has been updated by fernape: URL: https://cgit.FreeBSD.org/ports/commit/?id=46213c50d8ac9a2b3dc090e470ee0dde70127b48 commit 46213c50d8ac9a2b3dc090e470ee0dde70127b48 Author: Stefan Bethke AuthorDate: 2024-06-17 17:18:47 +0000 Commit: Fernando ApesteguĂ­a CommitDate: 2024-06-17 17:18:47 +0000 security/vuxml: Add www/forgejo vulnerability CVE-2024-24789 NVD assessment not yet provided PR: 299781 --- security/vuxml/vuln/2024.xml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 9625555b8194..52ab5c647d4c 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,39 @@ + + forgejo -- multiple issues + + + forgejo + 7.0.4 + + + + +

The forgejo team reports:

+
+

CVE-2024-24789: + The archive/zip package's handling of certain types of invalid + zip files differs from the behavior of most zip implementations. + This misalignment could be exploited to create an zip file with + contents that vary depending on the implementation reading the + file.

+

The OAuth2 implementation does not always require authentication + for public clients, a requirement of RFC 6749 Section 10.2. A + malicious client can impersonate another client and obtain access + to protected resources if the impersonated client fails to, or is + unable to, keep its client credentials confidential.

+
+ +
+ + CVE-2024-24789 + https://nvd.nist.gov/vuln/detail/CVE-2024-24789 + + + 2024-04-04 + 2024-04-11 + +
+ traefik -- Unexpected behavior with IPv4-mapped IPv6 addresses