Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 17 Jan 2018 20:50:17 +0000 (UTC)
From:      Steve Wills <swills@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r459287 - head/security/vuxml
Message-ID:  <201801172050.w0HKoHmu072758@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: swills
Date: Wed Jan 17 20:50:17 2018
New Revision: 459287
URL: https://svnweb.freebsd.org/changeset/ports/459287

Log:
  Document GitLab issue

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Jan 17 20:38:40 2018	(r459286)
+++ head/security/vuxml/vuln.xml	Wed Jan 17 20:50:17 2018	(r459287)
@@ -58,6 +58,38 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="65fab89f-2231-46db-8541-978f4e87f32a">
+    <topic>gitlab -- Remote code execution on project import</topic>
+    <affects>
+      <package>
+	<name>gitlab</name>
+	<range><lt>10.1.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>GitLab developers report:</p>
+	<blockquote cite="https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/">;
+	  <p>Today we are releasing versions 10.3.4, 10.2.6, and 10.1.6 for
+	  GitLab Community Edition (CE) and Enterprise Edition (EE).</p>
+	  <p>These versions contain a number of important security fixes,
+	  including two that prevent remote code execution, and we strongly
+	  recommend that all GitLab installations be upgraded to one of these
+	  versions immediately.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://about.gitlab.com/2018/01/16/gitlab-10-dot-3-dot-4-released/</url>;
+      <cvename>CVE-2017-0915</cvename>
+      <cvename>CVE-2018-3710</cvename>
+    </references>
+    <dates>
+      <discovery>2018-01-16</discovery>
+      <entry>2018-01-17</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="3e5b8bd3-0c32-452f-a60e-beab7b762351">
     <topic>transmission-daemon -- vulnerable to dns rebinding attacks</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201801172050.w0HKoHmu072758>