aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorMark Felder <feld@FreeBSD.org>2016-11-09 16:24:22 +0000
committerMark Felder <feld@FreeBSD.org>2016-11-09 16:24:22 +0000
commitcf27d8aa60f885995c5f8eccfe74120b02544fef (patch)
tree88c350ff4b2833da9ce3ec22ace6ba71a77dada7 /security
parent37f2ae14a30611803b85e6d9f58dabcdbf716b0e (diff)
downloadports-cf27d8aa60f885995c5f8eccfe74120b02544fef.tar.gz
ports-cf27d8aa60f885995c5f8eccfe74120b02544fef.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml35
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 421968fb37b9..95ed67358036 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,41 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="10968dfd-a687-11e6-b2d3-60a44ce6887b">
+ <topic>gitlab -- Directory traversal via "import/export" feature</topic>
+ <affects>
+ <package>
+ <name>rubygem-gitlab</name>
+ <range><ge>8.10.0</ge><le>8.10.12</le></range>
+ <range><ge>8.11.0</ge><le>8.11.9</le></range>
+ <range><ge>8.12.0</ge><le>8.12.7</le></range>
+ <range><ge>8.13.0</ge><le>8.13.2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GitLab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2016/11/02/cve-2016-9086-patches/">
+ <p>The import/export feature did not properly check for symbolic links
+ in user-provided archives and therefore it was possible for an
+ authenticated user to retrieve the contents of any file
+ accessible to the GitLab service account. This included
+ sensitive files such as those that contain secret tokens used
+ by the GitLab service to authenticate users.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2016/11/02/cve-2016-9086-patches/</url>
+ <cvename>CVE-2016-9086</cvename>
+ <freebsdpr>ports/214360</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2016-11-02</discovery>
+ <entry>2016-11-09</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ae9cb9b8-a203-11e6-a265-3065ec8fd3ec">
<topic>chromium -- out-of-bounds memory access</topic>
<affects>