From nobody Sat Oct 30 08:33:33 2021 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 0711C181C099; Sat, 30 Oct 2021 08:33:34 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HhCHd6fgVz3MDd; Sat, 30 Oct 2021 08:33:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id C43F8274AB; Sat, 30 Oct 2021 08:33:33 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 19U8XX4M097325; Sat, 30 Oct 2021 08:33:33 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 19U8XXYg097324; Sat, 30 Oct 2021 08:33:33 GMT (envelope-from git) Date: Sat, 30 Oct 2021 08:33:33 GMT Message-Id: <202110300833.19U8XXYg097324@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Matthias Fechner Subject: git: 714b88f8c46c - main - security/vuxml: Document gitlab vulnerabilities List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: mfechner X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 714b88f8c46cd19240c35db843ebd9960c103b83 Auto-Submitted: auto-generated X-ThisMailContainsUnwantedMimeParts: N The branch main has been updated by mfechner: URL: https://cgit.FreeBSD.org/ports/commit/?id=714b88f8c46cd19240c35db843ebd9960c103b83 commit 714b88f8c46cd19240c35db843ebd9960c103b83 Author: Matthias Fechner AuthorDate: 2021-10-30 08:15:29 +0000 Commit: Matthias Fechner CommitDate: 2021-10-30 08:33:11 +0000 security/vuxml: Document gitlab vulnerabilities --- security/vuxml/vuln-2021.xml | 57 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 59cf97125ed7..b6e8d83c08ad 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,60 @@ + + Gitlab -- Multiple Vulnerabilities + + + gitlab-ce + 14.4.014.4.1 + 14.3.014.3.4 + 014.2.6 + + + + +

Gitlab reports:

+
+

Stored XSS via ipynb files

+

Pipeline schedules on imported projects can be set to automatically active after import

+

Potential Denial of service via Workhorse

+

Improper Access Control allows Merge Request creator to bypass locked status

+

Projects API discloses ID and name of private groups

+

Severity of an incident can be changed by a guest user

+

System root password accidentally written to log file

+

Potential DoS via a malformed TIFF image

+

Bypass of CODEOWNERS Merge Request approval requirement

+

Change project visibility to a restricted option

+

Project exports leak external webhook token value

+

SCIM token is visible after creation

+

Invited group members, with access inherited from parent group, continue to have project access even after invited subgroup is transfered

+

Regular expression denial of service issue when cleaning namespace path

+

Prevent creation of scopeless apps using applications API

+

Webhook data exposes assignee's private email address

+
+ +
+ + CVE-2021-39906 + CVE-2021-39895 + CVE-2021-39907 + CVE-2021-39904 + CVE-2021-39905 + CVE-2021-39902 + CVE-2021-39913 + CVE-2021-39912 + CVE-2021-39909 + CVE-2021-39903 + CVE-2021-39898 + CVE-2021-39901 + CVE-2021-39897 + CVE-2021-39914 + CVE-2021-39911 + https://about.gitlab.com/releases/2021/10/28/security-release-gitlab-14-4-1-released/ + + + 2021-10-28 + 2021-10-30 + +
+ chromium -- multiple vulnerabilities