Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Nov 2019 19:04:25 +0000 (UTC)
From:      Matthias Fechner <mfechner@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r518519 - head/security/vuxml
Message-ID:  <201911271904.xARJ4PdN059437@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: mfechner
Date: Wed Nov 27 19:04:25 2019
New Revision: 518519
URL: https://svnweb.freebsd.org/changeset/ports/518519

Log:
  Document www/gitlab-ce vulnerabilities.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Nov 27 18:48:32 2019	(r518518)
+++ head/security/vuxml/vuln.xml	Wed Nov 27 19:04:25 2019	(r518519)
@@ -58,6 +58,71 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="1aa7a094-1147-11ea-b537-001b217b3468">
+    <topic>Gitlab -- Multiple Vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>gitlab-ce</name>
+	<range><ge>12.5.0</ge><lt>12.5.1</lt></range>
+	<range><ge>12.4.0</ge><lt>12.4.4</lt></range>
+	<range><lt>12.3.7</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Gitlab reports:</p>
+	<blockquote cite="https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/">;
+	  <p>Path traversal with potential remote code execution</p>
+	  <p>Private objects exposed through project import</p>
+	  <p>Disclosure of notes via Elasticsearch integration</p>
+	  <p>Disclosure of comments via Elasticsearch integration</p>
+	  <p>DNS Rebind SSRF in various chat notifications</p>
+	  <p>Disclosure of vulnerability status in dependency list</p>
+	  <p>Disclosure of commit count in Cycle Analytics</p>
+	  <p>Exposure of related branch names</p>
+	  <p>Tags pushes from blocked users</p>
+	  <p>Branches and Commits exposed to Guest members via integration</p>
+	  <p>IDOR when adding users to protected environments</p>
+	  <p>Former project members able to access repository information</p>
+	  <p>Unauthorized access to grafana metrics</p>
+	  <p>Todos created for former project members</p>
+	  <p>Update Mattermost dependency</p>
+	  <p>Disclosure of AWS secret keys on certain Admin pages</p>
+	  <p>Stored XSS in Group and User profile fields</p>
+	  <p>Forked project information disclosed via Project API</p>
+	  <p>Denial of Service in the issue and commit comment pages</p>
+	  <p>Tokens stored in plaintext</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/</url>;
+      <cvename>CVE-2019-19088</cvename>
+      <cvename>CVE-2019-19309</cvename>
+      <cvename>CVE-2019-19086</cvename>
+      <cvename>CVE-2019-19087</cvename>
+      <cvename>CVE-2019-19261</cvename>
+      <cvename>CVE-2019-19256</cvename>
+      <cvename>CVE-2019-19254</cvename>
+      <cvename>CVE-2019-19257</cvename>
+      <cvename>CVE-2019-19263</cvename>
+      <cvename>CVE-2019-19258</cvename>
+      <cvename>CVE-2019-19259</cvename>
+      <cvename>CVE-2019-19260</cvename>
+      <cvename>CVE-2019-19262</cvename>
+      <cvename>CVE-2019-19255</cvename>
+      <cvename>CVE-2019-19310</cvename>
+      <cvename>CVE-2019-19311</cvename>
+      <cvename>CVE-2019-19312</cvename>
+      <cvename>CVE-2019-19313</cvename>
+      <cvename>CVE-2019-19314</cvename>
+    </references>
+    <dates>
+      <discovery>2019-11-27</discovery>
+      <entry>2019-11-27</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3e748551-c732-45f6-bd88-928da16f23a8">
     <topic>webkit2-gtk3 -- Multiple vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201911271904.xARJ4PdN059437>