git: a02e41dfbd7f - main - security/vuxml: Document gitlab vulnerabilities

From: Matthias Fechner <mfechner_at_FreeBSD.org>
Date: Mon, 04 Apr 2022 15:00:23 UTC
The branch main has been updated by mfechner:

URL: https://cgit.FreeBSD.org/ports/commit/?id=a02e41dfbd7f0f93c5e87ed7d50415aab714d1c7

commit a02e41dfbd7f0f93c5e87ed7d50415aab714d1c7
Author:     Matthias Fechner <mfechner@FreeBSD.org>
AuthorDate: 2022-04-04 14:59:34 +0000
Commit:     Matthias Fechner <mfechner@FreeBSD.org>
CommitDate: 2022-04-04 15:00:13 +0000

    security/vuxml: Document gitlab vulnerabilities
---
 security/vuxml/vuln-2022.xml | 60 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 60 insertions(+)

diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 487e0c516204..ef7d36e06cfe 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,63 @@
+  <vuln vid="8657eedd-b423-11ec-9559-001b217b3468">
+    <topic>Gitlab -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gitlab-ce</name>
+	<range><ge>14.9.0</ge><lt>14.9.2</lt></range>
+	<range><ge>14.8.0</ge><lt>14.8.5</lt></range>
+	<range><ge>0</ge><lt>14.7.7</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Gitlab reports:</p>
+	<blockquote cite="https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/">
+	  <p>Static passwords inadvertently set during OmniAuth-based registration</p>
+	  <p>Stored XSS in notes</p>
+	  <p>Stored XSS on Multi-word milestone reference</p>
+	  <p>Denial of service caused by a specially crafted RDoc file</p>
+	  <p>GitLab Pages access tokens can be reused on multiple domains</p>
+	  <p>GitLab Pages uses default (disabled) server Timeouts and a weak TCP Keep-Alive timeout</p>
+	  <p>Incorrect include in pipeline definition exposes masked CI variables in UI</p>
+	  <p>Regular expression denial of service in release asset link</p>
+	  <p>Latest Commit details from private projects leaked to guest users via Merge Requests</p>
+	  <p>CI/CD analytics are available even when public pipelines are disabled</p>
+	  <p>Absence of limit for the number of tags that can be added to a runner can cause performance issues</p>
+	  <p>Client DoS through rendering crafted comments</p>
+	  <p>Blind SSRF Through Repository Mirroring</p>
+	  <p>Bypass of branch restriction in Asana integration</p>
+	  <p>Readable approval rules by Guest user</p>
+	  <p>Redact InvalidURIError error messages</p>
+	  <p>Project import maps members' created_by_id users based on source user ID</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-1162</cvename>
+      <cvename>CVE-2022-1175</cvename>
+      <cvename>CVE-2022-1190</cvename>
+      <cvename>CVE-2022-1185</cvename>
+      <cvename>CVE-2022-1148</cvename>
+      <cvename>CVE-2022-1121</cvename>
+      <cvename>CVE-2022-1120</cvename>
+      <cvename>CVE-2022-1100</cvename>
+      <cvename>CVE-2022-1193</cvename>
+      <cvename>CVE-2022-1105</cvename>
+      <cvename>CVE-2022-1099</cvename>
+      <cvename>CVE-2022-1174</cvename>
+      <cvename>CVE-2022-1188</cvename>
+      <cvename>CVE-2022-0740</cvename>
+      <cvename>CVE-2022-1189</cvename>
+      <cvename>CVE-2022-1157</cvename>
+      <cvename>CVE-2022-1111</cvename>
+      <url>https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/</url>
+    </references>
+    <dates>
+      <discovery>2022-03-31</discovery>
+      <entry>2022-04-04</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="79ea6066-b40e-11ec-8b93-080027b24e86">
     <topic>mediawiki -- multiple vulnerabilities</topic>
     <affects>