exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Security Advisory 4206-1

Debian Security Advisory 4206-1
Posted May 23, 2018
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4206-1 - Several vulnerabilities have been discovered in Gitlab, a software platform to collaborate on code.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2017-0920, CVE-2018-8971
SHA-256 | b90e604494b3ffae9f36761ced67f9dddbd660ef359a92d76210c3f564e6c64f

Debian Security Advisory 4206-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian Security Advisory DSA-4206-1 security@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
May 21, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : gitlab
CVE ID : CVE-2017-0920 CVE-2018-8971

Several vulnerabilities have been discovered in Gitlab, a software
platform to collaborate on code:

CVE-2017-0920

It was discovered that missing validation of merge requests allowed
users to see names to private projects, resulting in information
disclosure.

CVE-2018-8971

It was discovered that the Auth0 integration was implemented
incorrectly.

For the stable distribution (stretch), these problems have been fixed in
version 8.13.11+dfsg1-8+deb9u2. The fix for CVE-2018-8971 also requires
ruby-omniauth-auth0 to be upgraded to version 2.0.0-0+deb9u1.

We recommend that you upgrade your gitlab packages.

For the detailed security status of gitlab please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/gitlab

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
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=q0tg
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close