Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
Boxiang Sun
gitlab-ce
Commits
c07183f0
Commit
c07183f0
authored
Nov 29, 2018
by
Steve Azzopardi
Browse files
Options
Browse Files
Download
Plain Diff
Merge branch 'master' of dev.gitlab.org:gitlab/gitlabhq
parents
a5f46278
31f9223a
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
92 additions
and
0 deletions
+92
-0
CHANGELOG.md
CHANGELOG.md
+92
-0
No files found.
CHANGELOG.md
View file @
c07183f0
...
...
@@ -2,6 +2,29 @@
documentation
](
doc/development/changelog.md
)
for instructions on adding your own
entry.
## 11.5.1 (2018-11-26)
### Security (17 changes)
-
Escape user fullname while rendering autocomplete template to prevent XSS.
-
Fix CRLF vulnerability in Project hooks.
-
Fix possible XSS attack in Markdown urls with spaces.
-
Redact sensitive information on gitlab-workhorse log.
-
Do not follow redirects in Prometheus service when making http requests to the configured api url.
-
Don't expose confidential information in commit message list.
-
Provide email notification when a user changes their email address.
-
Restrict Personal Access Tokens to API scope on web requests.
-
Resolve reflected XSS in Ouath authorize window.
-
Fix SSRF in project integrations.
-
Fixed ability to comment on locked/confidential issues.
-
Fixed ability of guest users to edit/delete comments on locked or confidential issues.
-
Fix milestone promotion authorization check.
-
Configure mermaid to not render HTML content in diagrams.
-
Fix a possible symlink time of check to time of use race condition in GitLab Pages.
-
Removed ability to see private group names when the group id is entered in the url.
-
Fix stored XSS for Environments.
## 11.5.0 (2018-11-22)
### Security (10 changes, 1 of them is from the community)
...
...
@@ -264,6 +287,36 @@ entry.
-
Disables stop environment button while the deploy is in progress.
## 11.4.8 (2018-11-27)
### Security (24 changes)
-
Escape entity title while autocomplete template rendering to prevent XSS. !2571
-
Resolve reflected XSS in Ouath authorize window.
-
Fix XSS in merge request source branch name.
-
Escape user fullname while rendering autocomplete template to prevent XSS.
-
Fix CRLF vulnerability in Project hooks.
-
Fix possible XSS attack in Markdown urls with spaces.
-
Redact sensitive information on gitlab-workhorse log.
-
Do not follow redirects in Prometheus service when making http requests to the configured api url.
-
Persist only SHA digest of PersonalAccessToken#token.
-
Don't expose confidential information in commit message list.
-
Provide email notification when a user changes their email address.
-
Restrict Personal Access Tokens to API scope on web requests.
-
Redact personal tokens in unsubscribe links.
-
Fix SSRF in project integrations.
-
Fixed ability to comment on locked/confidential issues.
-
Fixed ability of guest users to edit/delete comments on locked or confidential issues.
-
Fix milestone promotion authorization check.
-
Monkey kubeclient to not follow any redirects.
-
Configure mermaid to not render HTML content in diagrams.
-
Fix a possible symlink time of check to time of use race condition in GitLab Pages.
-
Removed ability to see private group names when the group id is entered in the url.
-
Fix stored XSS for Environments.
-
Prevent SSRF attacks in HipChat integration.
-
Validate Wiki attachments are valid temporary files.
## 11.4.7 (2018-11-20)
-
No changes.
...
...
@@ -544,6 +597,45 @@ entry.
-
Check frozen string in style builds. (gfyoung)
## 11.3.11 (2018-11-26)
### Security (33 changes)
-
Filter user sensitive data from discussions JSON. !2537
-
Escape entity title while autocomplete template rendering to prevent XSS. !2557
-
Restrict Personal Access Tokens to API scope on web requests.
-
Fix XSS in merge request source branch name.
-
Escape user fullname while rendering autocomplete template to prevent XSS.
-
Fix CRLF vulnerability in Project hooks.
-
Fix possible XSS attack in Markdown urls with spaces.
-
Redact sensitive information on gitlab-workhorse log.
-
Set timeout for syntax highlighting.
-
Do not follow redirects in Prometheus service when making http requests to the configured api url.
-
Persist only SHA digest of PersonalAccessToken#token.
-
Sanitize JSON data properly to fix XSS on Issue details page.
-
Don't expose confidential information in commit message list.
-
Markdown API no longer displays confidential title references unless authorized.
-
Provide email notification when a user changes their email address.
-
Properly filter private references from system notes.
-
Redact personal tokens in unsubscribe links.
-
Resolve reflected XSS in Ouath authorize window.
-
Fix SSRF in project integrations.
-
Fix stored XSS in merge requests from imported repository.
-
Fixed ability to comment on locked/confidential issues.
-
Fixed ability of guest users to edit/delete comments on locked or confidential issues.
-
Fix milestone promotion authorization check.
-
Monkey kubeclient to not follow any redirects.
-
Configure mermaid to not render HTML content in diagrams.
-
Redact confidential events in the API.
-
Fix xss vulnerability sourced from package.json.
-
Fix a possible symlink time of check to time of use race condition in GitLab Pages.
-
Removed ability to see private group names when the group id is entered in the url.
-
Fix stored XSS for Environments.
-
Block loopback addresses in UrlBlocker.
-
Prevent SSRF attacks in HipChat integration.
-
Validate Wiki attachments are valid temporary files.
## 11.3.10 (2018-11-18)
### Security (1 change)
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment