Date: Thu, 26 Mar 2020 20:27:30 +0000 (UTC) From: Matthias Fechner <mfechner@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r529214 - head/security/vuxml Message-ID: <202003262027.02QKRUHZ018269@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: mfechner Date: Thu Mar 26 20:27:30 2020 New Revision: 529214 URL: https://svnweb.freebsd.org/changeset/ports/529214 Log: Document gitlab vulnerabilities. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Mar 26 20:17:20 2020 (r529213) +++ head/security/vuxml/vuln.xml Thu Mar 26 20:27:30 2020 (r529214) @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="08fba28b-6f9f-11ea-bd0b-001b217b3468"> + <topic>Gitlab -- Multiple Vulnerabilities</topic> + <affects> + <package> + <name>gitlab-ce</name> + <range><ge>12.9.0</ge><lt>12.9.1</lt></range> + <range><ge>12.8.0</ge><lt>12.8.8</lt></range> + <range><ge>0</ge><lt>12.7.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Gitlab reports:</p> + <blockquote cite="https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/"> + <p>Arbitrary File Read when Moving an Issue</p> + <p>Path Traversal in NPM Package Registry</p> + <p>SSRF on Project Import</p> + <p>External Users Can Create Personal Snippet</p> + <p>Triggers Decription Can be Updated by Other Maintainers in Project</p> + <p>Information Disclosure on Confidential Issues Moved to Private Programs</p> + <p>Potential DoS in Repository Archive Download</p> + <p>Blocked Users Can Still Pull/Push Docker Images</p> + <p>Repository Mirroring not Disabled when Feature not Activated</p> + <p>Vulnerability Feedback Page Was Leaking Information on Vulnerabilities</p> + <p>Stored XSS Vulnerability in Admin Feature</p> + <p>Upload Feature Allowed a User to Read Unauthorized Exported Files</p> + <p>Unauthorized Users Are Able to See CI Metrics</p> + <p>Last Pipeline Status of a Merge Request Leaked</p> + <p>Blind SSRF on FogBugz</p> + <p>Update Nokogiri dependency</p> + </blockquote> + </body> + </description> + <references> + <url>https://about.gitlab.com/releases/2020/03/26/security-release-12-dot-9-dot-1-released/</url> + <cvename>CVE-2020-10953</cvename> + <cvename>CVE-2020-10956</cvename> + <cvename>CVE-2020-10954.</cvename> + <cvename>CVE-2020-10952</cvename> + <cvename>CVE-2020-10955</cvename> + <cvename>CVE-2020-9795</cvename> + </references> + <dates> + <discovery>2020-03-26</discovery> + <entry>2020-03-26</entry> + </dates> + </vuln> + <vuln vid="40194e1c-6d89-11ea-8082-80ee73419af3"> <topic>rubygem-json -- Unsafe Objection Creation Vulnerability in JSON (Additional fix)</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202003262027.02QKRUHZ018269>