git: 433216ab05d0 - main - security/vuxml: fix validation errors
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 04 Oct 2023 01:18:02 UTC
The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=433216ab05d04f834b1cca92a57f57145f216a83 commit 433216ab05d04f834b1cca92a57f57145f216a83 Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2023-10-04 01:16:18 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2023-10-04 01:16:18 +0000 security/vuxml: fix validation errors Fix whitespace errors in vid 6e0ebb4a-5e75-11ee-a365-001b217b3468 introduced by commit 36a838e202256d5a528abfc8ff6a66ca7ce4d148. --- security/vuxml/vuln/2023.xml | 34 +++++++++++++++++----------------- 1 file changed, 17 insertions(+), 17 deletions(-) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index 5688a356c700..286acda968b5 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -202,23 +202,23 @@ </affects> <description> <body> - <p>Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</p> - <p>Group import allows impersonation of users in CI pipelines</p> - <p>Developers can bypass code owners approval by changing a MR's base branch</p> - <p>Leaking source code of restricted project through a fork</p> - <p>Third party library Consul requires enable-script-checks to be False to enable patch</p> - <p>Service account not deleted when namespace is deleted allowing access to internal projects</p> - <p>Enforce SSO settings bypassed for public projects for Members without identity</p> - <p>Removed project member can write to protected branches</p> - <p>Unauthorised association of CI jobs for Machine Learning experiments</p> - <p>Force pipelines to not have access to protected variables and will likely fail using tags</p> - <p>Maintainer can create a fork relationship between existing projects</p> - <p>Disclosure of masked CI variables via processing CI/CD configuration of forks</p> - <p>Asset Proxy Bypass using non-ASCII character in asset URI</p> - <p>Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches</p> - <p>Removed Developer can continue editing the source code of a public project</p> - <p>A project reporter can leak owner's Sentry instance projects</p> - <p>Math rendering in markdown can escape container and hijack clicks</p> + <p>Attacker can add other projects policy bot as member to their own project and use that bot to trigger pipelines in victims project</p> + <p>Group import allows impersonation of users in CI pipelines</p> + <p>Developers can bypass code owners approval by changing a MR's base branch</p> + <p>Leaking source code of restricted project through a fork</p> + <p>Third party library Consul requires enable-script-checks to be False to enable patch</p> + <p>Service account not deleted when namespace is deleted allowing access to internal projects</p> + <p>Enforce SSO settings bypassed for public projects for Members without identity</p> + <p>Removed project member can write to protected branches</p> + <p>Unauthorised association of CI jobs for Machine Learning experiments</p> + <p>Force pipelines to not have access to protected variables and will likely fail using tags</p> + <p>Maintainer can create a fork relationship between existing projects</p> + <p>Disclosure of masked CI variables via processing CI/CD configuration of forks</p> + <p>Asset Proxy Bypass using non-ASCII character in asset URI</p> + <p>Unauthorized member can gain Allowed to push and merge access and affect integrity of protected branches</p> + <p>Removed Developer can continue editing the source code of a public project</p> + <p>A project reporter can leak owner's Sentry instance projects</p> + <p>Math rendering in markdown can escape container and hijack clicks</p> </body> </description> <references>